How I hacked hackers at LeHack event 2025
作者在LeHack 2025活动中利用8个ESP32-C3模块和M5Stack设备搭建了一个钓鱼攻击演示系统,模拟真实Wi-Fi网络诱骗设备连接,并通过门户页面提醒用户注意Karma攻击风险。实验吸引了100个设备连接,包括活动演讲者的话筒,展示了即使在黑客大会中仍存在安全漏洞。 2025-7-11 07:6:53 Author: www.reddit.com(查看原文) 阅读量:4 收藏

How I hacked hackers at LeHack event 2025

Just got back from LeHack, and I figured I'd share a quick write-up of a small PoC I ran during the event.

My Setup:

  • 8x ESP32-C3 running custom karma firmware

  • 2x M5Stack CardPuters as control interfaces

  • SSID list preloaded from Wigle data (targeting real-world networks)

  • Captive portal triggered upon connection, no creds harvested, no payloads, just awareness page about karma attack.

  • Devices isolated, no MITM, no storage – just a "reminder" trap

Result: 100 unique connections in parallel all over the weekend, including… a speaker on stage (yep – sorry Virtualabs/Xilokar 😅 apologies and authorisation of publication was made).
Plenty of unaware phones still auto-joining known SSIDs in 2025, even in a hacker con.

Main goal was awareness. Just wanted to demonstrate how trivial it still is to spoof trusted Wi-Fi.
Got some solid convos after people hit the splash page.

Full write-up: https://7h30th3r0n3.fr/how-i-hacked-hackers-at-lehack-2025/

For technical details of the Evil-M5project: https://github.com/7h30th3r0n3/Evil-M5Project/wiki

Building tutorial : https://github.com/7h30th3r0n3/Evil-M5Project/wiki/esp32-rig-tutorial

If you were at LeHack and saw the captive-portal or wanna discuss something similar, happy to chat.
Let’s keep raising the bar.

Fun fact : Samsung pushed a update that prevent to reconnect to open network automatically few days ago ! Things change little by little ! ☺️


文章来源: https://www.reddit.com/r/HowToHack/comments/1lx0ch5/how_i_hacked_hackers_at_lehack_event_2025/
如有侵权请联系:admin#unsafe.sh