Meet the NetGotchi: A New Firmware for ESP32 boards Packed with Defensive Tools

Sam's eXperiments logs
10 Sept 202408:55

Summary

TLDRThis video tutorial guides viewers through installing the NetGOI firmware on an ESP32 project, focusing on its defensive capabilities like network intrusion detection. It simplifies the setup by eliminating the need for a micro USB cable, offering a complete package for under a dollar. The video demonstrates downloading the source from GitHub, installing necessary libraries in Arduino IDE, and flashing the firmware. It also covers configuring the device through the WiFi Manager dashboard, scanning for network vulnerabilities, and setting up an FTP server. The presenter expresses enthusiasm for the project's potential as a compact, user-friendly network scanner and honeypot.

Takeaways

  • ๐ŸŒ The video demonstrates installing the NetGuard firmware on an ESP32 project, which is designed for network monitoring and defense.
  • ๐Ÿ”ง The NetGuard project offers features like network intrusion detection and the capability to act as a honeypot.
  • ๐Ÿ’ป The setup process begins with downloading the latest source code from GitHub and then proceeding to the Arduino IDE for flashing the board.
  • ๐Ÿ“š Before flashing, it's necessary to install all the required dependencies and libraries in the Arduino IDE.
  • ๐Ÿ“ The script instructs viewers to copy specific library folders for the ADF, LCD, and FTP server, depending on the ESP model used.
  • ๐Ÿ–ฅ๏ธ For each library, the video mentions the need to use the Arduino Library Manager to search and install them if not already installed.
  • ๐Ÿ”„ The script describes the process of uploading the NetGuard sketch to the ESP device, which involves compiling and then uploading the firmware.
  • ๐Ÿ“ก After uploading, the device is wired with a screen, and the video shows the initial setup screen inviting users to configure NetGuard.
  • ๐Ÿ› ๏ธ The video showcases the use of the WiFi Manager dashboard for configuring the device's network settings.
  • ๐Ÿ”Ž The script details the process of scanning for network vulnerabilities and demonstrates the detection of an open SSH server.
  • ๐Ÿ“Š The video concludes with the presenter expressing satisfaction with the project's ease of use and installation, and a call for constructive feedback.

Q & A

  • What is the main purpose of the NetGOI project discussed in the video?

    -The NetGOI project is primarily on the defensive side, offering intrusion detection features and the ability to act as a honeypot.

  • What are the advantages of using NetGOI according to the video?

    -NetGOI is advantageous because it doesn't require a micro USB cable for programming, and it includes everything needed for less than one dollar.

  • Where does one need to go to download the latest source for NetGOI?

    -The latest source for NetGOI can be downloaded from its GitHub page.

  • What software is used to flash the NetGOI firmware onto the board?

    -Arduino IDE is used to flash the NetGOI firmware onto the board.

  • What are the necessary steps before flashing the NetGOI firmware?

    -Before flashing, one needs to install all the dependencies and ensure the correct libraries are installed in the Arduino IDE.

  • How does one install the required libraries for NetGOI in Arduino IDE?

    -One needs to copy the library names from the NetGOI GitHub page and install them using the library manager in Arduino IDE.

  • What additional hardware is needed to use NetGOI besides the ESP board?

    -An additional requirement is a screen, which is connected to the board to display the NetGOI interface.

  • How does the video demonstrate the configuration of NetGOI?

    -The video demonstrates the configuration by connecting the board to the WiFi Manager dashboard and setting up the actual test Wi-Fi.

  • What features can be tested using NetGOI as shown in the video?

    -Features that can be tested include scanning for vulnerable hosts, running a ping test, and checking the time synchronization.

  • What issues were encountered while testing the FTP server functionality of NetGOI?

    -The FTP server that was started was not detected during the scan, and the video creator was unsure if anything was done wrong or if the scan happened infrequently.

  • What feedback does the video creator seek at the end of the demonstration?

    -The video creator seeks constructive feedback, as they find the NetGOI project promising for its honeypot or network scanner capabilities in a small form factor.

Outlines

00:00

๐Ÿ› ๏ธ Setting Up ESP32 with NetGuard IoT Firmware

This paragraph introduces a tutorial on installing NetGuard IoT firmware on an ESP32 project. The video emphasizes the defensive capabilities of NetGuard, such as intrusion detection and acting as a honeypot. The presenter highlights the convenience of the project, requiring minimal equipment like a micro USB cable and a small screen. The process begins with downloading the latest source code from GitHub, followed by setting up the Arduino IDE with necessary libraries. The presenter guides viewers through installing dependencies and libraries specific to the ESP32 or ESP8266, and the ADF, LCD, and FTP server. The tutorial continues with uploading the firmware to the ESP8266, configuring Wi-Fi, and demonstrating the initial interface of the NetGuard IoT, including autoconnect features and the Wi-Fi Manager dashboard.

05:03

๐Ÿ” Testing NetGuard IoT with Network Scanning

The second paragraph details the testing phase of the NetGuard IoT setup. The presenter uses another device to create a bridge between a wired network and an access point, simulating a network environment. The NetGuard IoT is then used to connect to this network, and the presenter demonstrates how it scans for vulnerabilities and services. The video shows the NetGuard IoT detecting an SSH server but not an FTP server that was intentionally set up, indicating potential issues with the scanning functionality. The presenter also mentions the lack of response from certain buttons and controls within the NetGuard interface, suggesting areas for improvement. Despite these challenges, the presenter expresses enthusiasm for the project's potential as a compact, user-friendly network scanner and honeypot, complete with a distinctive visual design.

Mindmap

Keywords

๐Ÿ’กESP32

ESP32 is a low-cost, low-power system on a chip (SoC) with integrated Wi-Fi and dual-mode Bluetooth BLE. In the context of the video, it is used as the main microcontroller for the project, highlighting its capabilities for IoT applications. The script mentions installing a new project on the ESP32, indicating its role as the central component for the net firmware.

๐Ÿ’กFirmware

Firmware refers to the software that provides the low-level control for a device's specific hardware. In the video, the term is used to describe the 'net firmware' being installed on the ESP32, which is a defensive tool for network security, emphasizing the importance of firmware in device functionality and security.

๐Ÿ’กHoneypot

A honeypot in cybersecurity is a decoy computer system or network set up as a trap to lure cyber attackers and study their methods. The video discusses the net firmware's ability to act as a honeypot, showcasing its defensive capabilities to detect and potentially mitigate cyber threats.

๐Ÿ’กArduino IDE

Arduino IDE is an integrated development environment (IDE) for programming hardware like the ESP32. The script mentions using Arduino IDE to flash the net firmware onto the ESP32, which illustrates the IDE's role in the development and deployment process for IoT projects.

๐Ÿ’กDependencies

In software development, dependencies are external libraries or modules that a program relies on to function. The video script describes the need to install dependencies in Arduino IDE before flashing the firmware, highlighting the importance of these libraries for the proper operation of the net firmware.

๐Ÿ’กLibraries

Libraries in programming are collections of pre-written code that can be used in a program. The script refers to installing libraries such as ADF, LCD, and FTP server, which are necessary for the ESP32 to perform its functions, emphasizing the modular nature of software development.

๐Ÿ’กAutoconnect AP

Autoconnect AP refers to an Access Point (AP) that automatically connects devices to a network. The video script mentions using an autoconnect AP for configuring the net firmware, which simplifies the setup process and allows for easier initial configuration of the device.

๐Ÿ’กWiFi Manager

A WiFi Manager is a software component that handles the connection and management of Wi-Fi networks. The video describes connecting to the WiFi Manager dashboard, which is part of the net firmware, indicating its role in managing network connections for the ESP32.

๐Ÿ’กPing

Ping is a network administration software used to test the reachability of a host on an Internet Protocol (IP) network. The script mentions the use of ping in the net firmware to test connectivity, which is a common method for verifying network functionality and the health of a connection.

๐Ÿ’กFTP Server

An FTP (File Transfer Protocol) server is a computer system that allows users to transfer files using the FTP protocol. The video discusses the setup of an FTP server as part of the net firmware's capabilities, which could be used for file transfers or as a honeypot to detect unauthorized access attempts.

๐Ÿ’กVulnerability Scanning

Vulnerability scanning is the process of scanning a computer system or network to identify potential vulnerabilities that could be exploited by malicious actors. The video script mentions the net firmware's ability to perform vulnerability scanning, which is a key feature for network security assessment.

Highlights

Installing a new ESP32 project with net firmware for defensive capabilities.

The net firmware offers intrusion detection features and the ability to act as a honeypot.

The project is praised for its ease of use, requiring no additional hardware like a micro USB cable.

Everything needed for the project can be obtained for less than one dollar.

The process starts by downloading the latest source from the GitHub page.

Arduino IDE is used to flash the board after downloading the source.

Dependencies must be installed before flashing the net firmware.

Correct libraries need to be installed in the Arduino IDE for the firmware to work.

The dip file should be opened to view the required libraries for specific boards or components.

Folders containing libraries for ADF, LCD, and FTP server are mentioned.

Instructions on copying library folders for different operating systems are provided.

The Arduino IDE's library manager is used to install the required libraries.

The net GOI .ino file is opened, and all necessary files are present in the same folder.

The upload process compiles the sketch and uploads it to the ESP8266.

The Alit gfix button and the ntp client are installed during the process.

The screen is wired to the board, and the net GOI interface is displayed.

The board is flashed and connected to the screen, showing an invitation to configure the net GOI.

The WiFi Manager dashboard is accessed through the net GOI interface.

The INF button provides detailed information about the chip.

The net GOI records the screen and displays animations during the setup.

The net GOI is used to connect to a Wi-Fi network and run tests to reach online servers.

The net GOI detects an SSH server but not an FTP server that was started during the test.

The user is unsure if the net GOI alert or host data information functions are working correctly.

The user expresses hope for constructive feedback on the promising project.

The user thanks viewers for watching and encourages them to stay tuned for new experiments.

Transcripts

play00:01

in this video we'll be installing a new

play00:05

esp32 project the net firmware if

play00:09

you have been watching the channel you

play00:11

may have noticed different project with

play00:14

offensive

play00:16

capabilities however the net GOI is on

play00:19

the defensive side offering an inion

play00:23

detection features and even the ability

play00:26

to act as an onot

play00:31

I really like this project because you

play00:32

don't need a much like a micro USB cable

play00:36

to P your ESP a little screen and the

play00:42

cable So Pro for less than1 or dollar

play00:46

you get everything you

play00:48

need so first thing first we are going

play00:51

to the GitHub page and download the

play00:54

latest source

play01:00

when this is done we will move to arino

play01:04

ID to flash the board but before this we

play01:09

need to install all the dependencies

play01:11

before being able to flash net guci

play01:14

firmware we will need to make sure we

play01:17

have the correct libraries installed in

play01:21

our uino

play01:24

IDE before you jump right into arino ID

play01:30

please open the dip file you need to go

play01:34

to libraries and here you will see

play01:37

several folders so each of them contains

play01:41

library for specific either board or

play01:46

component so here you could see for the

play01:48

ADF

play01:50

LCD and here for the FTP server either

play01:54

if you have a ESP 32 or ESP 8266

play01:59

and for both ESP ping and WiFi Manager

play02:03

you need to copy all these folders

play02:07

depending your operating system Windows

play02:10

Mac OS or Linux here so me I will copy

play02:15

that offline I don't see any point to

play02:18

show that in a video and then in ouro

play02:23

you need to go into the pile of books

play02:28

here so maybe

play02:30

we don't see that well and from that

play02:33

part here on the library manager you

play02:36

will need to copy and paste each name

play02:42

present in the library section onto net

play02:45

G's G up page so for instance out of

play02:50

with gfx unless you already have this a

play02:54

library installed for other project you

play02:57

will need to type it here in the library

play02:59

manager

play03:00

and install it so I will take this

play03:03

offline review that I have all the

play03:06

different libraries needed so nobody

play03:09

will see me struggling here and then

play03:12

we'll go on the next

play03:14

step I have opened the net GOI that IO

play03:18

file and all the other they are all

play03:22

present under the same folder so now I

play03:27

will click on upload so it will compile

play03:30

the sketch and then upload to my ESP

play03:36

8266 so now it's building and compiling

play03:42

everything I to install the

play03:46

Alit gfix the button to the ntp client

play03:52

and if you're using let's say the sh

play03:56

110x you need to use the library manager

play03:59

and download everything so now we could

play04:03

see it's still uploading so now the

play04:06

upload is completed I'm going to wire

play04:10

the screen to the board and we are going

play04:13

to see what we have

play04:16

here the board is now flashed and

play04:18

connected to the screen and as you can

play04:21

see here on the screen we are invited to

play04:24

use autoconnect AP SSID to configure the

play04:30

net GOI here we are connected to the

play04:33

WiFi Manager dashboard from the net GOI

play04:37

so we could see we have several buttons

play04:40

first one let's check INF for what we

play04:43

have here so we have all detail about

play04:46

chip I'm going to hit this button and

play04:49

set up

play04:51

my

play04:53

actual test Wi-Fi for this so now I will

play04:57

put my password see here I have recorded

play04:59

the screen of the net GOI and you could

play05:02

see some animation I found it pretty

play05:05

nice and now we're going to see what we

play05:08

could have generated by scanning some

play05:12

ports or generating some traffic right

play05:16

now I'm using another laptop with Cali

play05:20

and what he's doing here he's doing a

play05:23

bridge uh an access point with my wired

play05:28

Network and and the ssids is some XP so

play05:33

from here I'm going to use a net GOI to

play05:37

connect and then we're going to see what

play05:40

we could do so right now the net GOI is

play05:44

waiting for the credential I'm going to

play05:48

use the portal we see before and enter

play05:51

the credential now we have received an

play05:55

attempt to connect to the Wi-Fi network

play05:59

so so you could could see connection

play06:00

successful and now the net GOI is

play06:03

running all the test is trying to reach

play06:07

some servers online and you could see

play06:09

the Ping and now here SSID some XP and

play06:15

here we have the correct time on top

play06:17

left corner and he's happy there is one

play06:21

host that was scann and one vulnerable

play06:26

was found actually it is s

play06:30

which was turned on during the scan I

play06:34

have also started a FTP server however

play06:38

it was not found so I'm not really sure

play06:42

how often the scan happened I'm not sure

play06:46

if I did anything wrong so that was a

play06:48

screenshot from the interface I had from

play06:51

the net COI so you could see the actual

play06:55

displayed ahead and the status I didn't

play06:59

know what the control was supposed to do

play07:02

because it seems didn't work in my

play07:04

situation and same thing with the get

play07:06

host data information seems it didn't

play07:09

work either and like I said I had net

play07:14

GOI booing up while I only had SSH

play07:20

server it was detected then I started an

play07:25

FTP server it was not detected I run

play07:29

several Time end map towards net GOI IP

play07:32

address but they were not

play07:36

reported and I'm not quite sure here or

play07:39

I should like trigger either a net GOI

play07:43

alert or find any information about the

play07:48

potential

play07:49

hyot also I'm not sure what I should see

play07:53

on my network as kind of honeypots

play07:57

because I was monitoring for ARP request

play08:01

looking for potential news IPS or

play08:06

services on my network and maybe I

play08:09

overlooked but um hopefully this will

play08:13

make all constructive uh feedback

play08:16

because I found this project really

play08:18

promising to have kind of um Honeypot or

play08:23

network scanner in such a small form

play08:27

factor with a touch of a kawaii with all

play08:31

the eyes moving it's really remind me

play08:35

the pag GOI but in that situation it's

play08:38

much easy to use and to install by the

play08:42

way thank you for watching and stay

play08:45

tuned for new experiment

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
ESP32NetGOISecurityHoneypotNetwork MonitoringArduinoWiFi ManagerTouch ScreenDIY ProjectCyber Defense