Razor's Pocket-Size Peryton, Powered by an ESP32, Captures Wi-Fi Handshakes for Later Analysis
Just power it on, wait three minutes, and the Peryton will automatically capture all packets likely to contain the network password.
CodemasterPL of maker collective Razor has released a pocket-sized, ESP32-powered standalone sniffer designed to capture EAPOL frames and beacons from nearby wireless networks, capturing the data for later analysis on a laptop or other computer: Peryton.
"Peryton is a tiny Wi-Fi handshakes sniffer. It uses the wireless chip inside the board to listen for Wi-Fi frames and captures handshakes and beacons," its creators explain. "The core idea of Peryton is to keep things super simple. Thanks to this, all you need is turn it on, and download captured handshakes for further processing."
"Previously (with AttracThor) we worked to capture the Wi-Fi password by phishing the victim devices to provide the credentials by doing an Evil Twin attack. This time with Peryton, we don't care. We sniff for authentication frames, which are later used for cracking. This small device can be powered from pretty much anything (solar, power banks, USB) and with a small modification - you can even make it run on battery. Because this is based on ESP32, feel free to hack/modify it so it suits your needs."
When first powered up, the compact Peryton acts as an access point providing a configuration interface. After three minutes, it switches into capture mode — automatically hopping channels and capturing EAPOL frames and beacons, which are stored on the device in PCAP format. To download the captured packets for analysis, the Peryton is simply rebooted and a laptop or other device connected to the access point which appears.
The Peryton is now available from the Razor Tindie store for $50, including 3D-printed housing.