Meet the NetGotchi: A New Firmware for ESP32 boards Packed with Defensive Tools
Summary
TLDRThis video tutorial guides viewers through installing the NetGOI firmware on an ESP32 project, focusing on its defensive capabilities like network intrusion detection. It simplifies the setup by eliminating the need for a micro USB cable, offering a complete package for under a dollar. The video demonstrates downloading the source from GitHub, installing necessary libraries in Arduino IDE, and flashing the firmware. It also covers configuring the device through the WiFi Manager dashboard, scanning for network vulnerabilities, and setting up an FTP server. The presenter expresses enthusiasm for the project's potential as a compact, user-friendly network scanner and honeypot.
Takeaways
- 🌐 The video demonstrates installing the NetGuard firmware on an ESP32 project, which is designed for network monitoring and defense.
- 🔧 The NetGuard project offers features like network intrusion detection and the capability to act as a honeypot.
- 💻 The setup process begins with downloading the latest source code from GitHub and then proceeding to the Arduino IDE for flashing the board.
- 📚 Before flashing, it's necessary to install all the required dependencies and libraries in the Arduino IDE.
- 📁 The script instructs viewers to copy specific library folders for the ADF, LCD, and FTP server, depending on the ESP model used.
- 🖥️ For each library, the video mentions the need to use the Arduino Library Manager to search and install them if not already installed.
- 🔄 The script describes the process of uploading the NetGuard sketch to the ESP device, which involves compiling and then uploading the firmware.
- 📡 After uploading, the device is wired with a screen, and the video shows the initial setup screen inviting users to configure NetGuard.
- 🛠️ The video showcases the use of the WiFi Manager dashboard for configuring the device's network settings.
- 🔎 The script details the process of scanning for network vulnerabilities and demonstrates the detection of an open SSH server.
- 📊 The video concludes with the presenter expressing satisfaction with the project's ease of use and installation, and a call for constructive feedback.
Q & A
What is the main purpose of the NetGOI project discussed in the video?
-The NetGOI project is primarily on the defensive side, offering intrusion detection features and the ability to act as a honeypot.
What are the advantages of using NetGOI according to the video?
-NetGOI is advantageous because it doesn't require a micro USB cable for programming, and it includes everything needed for less than one dollar.
Where does one need to go to download the latest source for NetGOI?
-The latest source for NetGOI can be downloaded from its GitHub page.
What software is used to flash the NetGOI firmware onto the board?
-Arduino IDE is used to flash the NetGOI firmware onto the board.
What are the necessary steps before flashing the NetGOI firmware?
-Before flashing, one needs to install all the dependencies and ensure the correct libraries are installed in the Arduino IDE.
How does one install the required libraries for NetGOI in Arduino IDE?
-One needs to copy the library names from the NetGOI GitHub page and install them using the library manager in Arduino IDE.
What additional hardware is needed to use NetGOI besides the ESP board?
-An additional requirement is a screen, which is connected to the board to display the NetGOI interface.
How does the video demonstrate the configuration of NetGOI?
-The video demonstrates the configuration by connecting the board to the WiFi Manager dashboard and setting up the actual test Wi-Fi.
What features can be tested using NetGOI as shown in the video?
-Features that can be tested include scanning for vulnerable hosts, running a ping test, and checking the time synchronization.
What issues were encountered while testing the FTP server functionality of NetGOI?
-The FTP server that was started was not detected during the scan, and the video creator was unsure if anything was done wrong or if the scan happened infrequently.
What feedback does the video creator seek at the end of the demonstration?
-The video creator seeks constructive feedback, as they find the NetGOI project promising for its honeypot or network scanner capabilities in a small form factor.
Outlines
🛠️ Setting Up ESP32 with NetGuard IoT Firmware
This paragraph introduces a tutorial on installing NetGuard IoT firmware on an ESP32 project. The video emphasizes the defensive capabilities of NetGuard, such as intrusion detection and acting as a honeypot. The presenter highlights the convenience of the project, requiring minimal equipment like a micro USB cable and a small screen. The process begins with downloading the latest source code from GitHub, followed by setting up the Arduino IDE with necessary libraries. The presenter guides viewers through installing dependencies and libraries specific to the ESP32 or ESP8266, and the ADF, LCD, and FTP server. The tutorial continues with uploading the firmware to the ESP8266, configuring Wi-Fi, and demonstrating the initial interface of the NetGuard IoT, including autoconnect features and the Wi-Fi Manager dashboard.
🔍 Testing NetGuard IoT with Network Scanning
The second paragraph details the testing phase of the NetGuard IoT setup. The presenter uses another device to create a bridge between a wired network and an access point, simulating a network environment. The NetGuard IoT is then used to connect to this network, and the presenter demonstrates how it scans for vulnerabilities and services. The video shows the NetGuard IoT detecting an SSH server but not an FTP server that was intentionally set up, indicating potential issues with the scanning functionality. The presenter also mentions the lack of response from certain buttons and controls within the NetGuard interface, suggesting areas for improvement. Despite these challenges, the presenter expresses enthusiasm for the project's potential as a compact, user-friendly network scanner and honeypot, complete with a distinctive visual design.
Mindmap
Keywords
💡ESP32
💡Firmware
💡Honeypot
💡Arduino IDE
💡Dependencies
💡Libraries
💡Autoconnect AP
💡WiFi Manager
💡Ping
💡FTP Server
💡Vulnerability Scanning
Highlights
Installing a new ESP32 project with net firmware for defensive capabilities.
The net firmware offers intrusion detection features and the ability to act as a honeypot.
The project is praised for its ease of use, requiring no additional hardware like a micro USB cable.
Everything needed for the project can be obtained for less than one dollar.
The process starts by downloading the latest source from the GitHub page.
Arduino IDE is used to flash the board after downloading the source.
Dependencies must be installed before flashing the net firmware.
Correct libraries need to be installed in the Arduino IDE for the firmware to work.
The dip file should be opened to view the required libraries for specific boards or components.
Folders containing libraries for ADF, LCD, and FTP server are mentioned.
Instructions on copying library folders for different operating systems are provided.
The Arduino IDE's library manager is used to install the required libraries.
The net GOI .ino file is opened, and all necessary files are present in the same folder.
The upload process compiles the sketch and uploads it to the ESP8266.
The Alit gfix button and the ntp client are installed during the process.
The screen is wired to the board, and the net GOI interface is displayed.
The board is flashed and connected to the screen, showing an invitation to configure the net GOI.
The WiFi Manager dashboard is accessed through the net GOI interface.
The INF button provides detailed information about the chip.
The net GOI records the screen and displays animations during the setup.
The net GOI is used to connect to a Wi-Fi network and run tests to reach online servers.
The net GOI detects an SSH server but not an FTP server that was started during the test.
The user is unsure if the net GOI alert or host data information functions are working correctly.
The user expresses hope for constructive feedback on the promising project.
The user thanks viewers for watching and encourages them to stay tuned for new experiments.
Transcripts
in this video we'll be installing a new
esp32 project the net firmware if
you have been watching the channel you
may have noticed different project with
offensive
capabilities however the net GOI is on
the defensive side offering an inion
detection features and even the ability
to act as an onot
I really like this project because you
don't need a much like a micro USB cable
to P your ESP a little screen and the
cable So Pro for less than1 or dollar
you get everything you
need so first thing first we are going
to the GitHub page and download the
latest source
when this is done we will move to arino
ID to flash the board but before this we
need to install all the dependencies
before being able to flash net guci
firmware we will need to make sure we
have the correct libraries installed in
our uino
IDE before you jump right into arino ID
please open the dip file you need to go
to libraries and here you will see
several folders so each of them contains
library for specific either board or
component so here you could see for the
ADF
LCD and here for the FTP server either
if you have a ESP 32 or ESP 8266
and for both ESP ping and WiFi Manager
you need to copy all these folders
depending your operating system Windows
Mac OS or Linux here so me I will copy
that offline I don't see any point to
show that in a video and then in ouro
you need to go into the pile of books
here so maybe
we don't see that well and from that
part here on the library manager you
will need to copy and paste each name
present in the library section onto net
G's G up page so for instance out of
with gfx unless you already have this a
library installed for other project you
will need to type it here in the library
manager
and install it so I will take this
offline review that I have all the
different libraries needed so nobody
will see me struggling here and then
we'll go on the next
step I have opened the net GOI that IO
file and all the other they are all
present under the same folder so now I
will click on upload so it will compile
the sketch and then upload to my ESP
8266 so now it's building and compiling
everything I to install the
Alit gfix the button to the ntp client
and if you're using let's say the sh
110x you need to use the library manager
and download everything so now we could
see it's still uploading so now the
upload is completed I'm going to wire
the screen to the board and we are going
to see what we have
here the board is now flashed and
connected to the screen and as you can
see here on the screen we are invited to
use autoconnect AP SSID to configure the
net GOI here we are connected to the
WiFi Manager dashboard from the net GOI
so we could see we have several buttons
first one let's check INF for what we
have here so we have all detail about
chip I'm going to hit this button and
set up
my
actual test Wi-Fi for this so now I will
put my password see here I have recorded
the screen of the net GOI and you could
see some animation I found it pretty
nice and now we're going to see what we
could have generated by scanning some
ports or generating some traffic right
now I'm using another laptop with Cali
and what he's doing here he's doing a
bridge uh an access point with my wired
Network and and the ssids is some XP so
from here I'm going to use a net GOI to
connect and then we're going to see what
we could do so right now the net GOI is
waiting for the credential I'm going to
use the portal we see before and enter
the credential now we have received an
attempt to connect to the Wi-Fi network
so so you could could see connection
successful and now the net GOI is
running all the test is trying to reach
some servers online and you could see
the Ping and now here SSID some XP and
here we have the correct time on top
left corner and he's happy there is one
host that was scann and one vulnerable
was found actually it is s
which was turned on during the scan I
have also started a FTP server however
it was not found so I'm not really sure
how often the scan happened I'm not sure
if I did anything wrong so that was a
screenshot from the interface I had from
the net COI so you could see the actual
displayed ahead and the status I didn't
know what the control was supposed to do
because it seems didn't work in my
situation and same thing with the get
host data information seems it didn't
work either and like I said I had net
GOI booing up while I only had SSH
server it was detected then I started an
FTP server it was not detected I run
several Time end map towards net GOI IP
address but they were not
reported and I'm not quite sure here or
I should like trigger either a net GOI
alert or find any information about the
potential
hyot also I'm not sure what I should see
on my network as kind of honeypots
because I was monitoring for ARP request
looking for potential news IPS or
services on my network and maybe I
overlooked but um hopefully this will
make all constructive uh feedback
because I found this project really
promising to have kind of um Honeypot or
network scanner in such a small form
factor with a touch of a kawaii with all
the eyes moving it's really remind me
the pag GOI but in that situation it's
much easy to use and to install by the
way thank you for watching and stay
tuned for new experiment
浏览更多相关视频
An Introduction to ROS, the Robot Operating System: Install and put together (3/6)
How to Install VMware vSphere Hypervisor ESXi 6.7 on VMware Workstation 15
Cisco Packet Tracer | Everything You Need to Know
Creating a Azure Cloud Server: A Step-by-Step Tutorial (IaaS)
Xiaomi Global Firmware Install Tutorial - How To - Mi Flash - English
手把手教大家搭建Autogen|微軟的多智能體協作系統|多AI協調|#multi-agent #autogen #openai #chatpgt #gpt4 #gpt #web3
5.0 / 5 (0 votes)