+3197010267156
DSTIKE Deauther Watch V4S/V4S-IR Version
DSTIKE Deauther Watch V4S/V4S-IR Version
13392 16337

DSTIKE Deauther Watch V4S/V4S-IR Version

DSTK-DSTK-BSL1XJ
14 Days
Price in points: 164 points
Reward points: 3 points
+
Add to wish list Compare Ask a question
Delivery

To niektóre z metod dostawy, z których korzystamy. Dostępność i czas dostawy mogą się różnić w zależności od kraju.

Payment options
Mastercard Visa IDeal Bancontact Przelew bankowy
Odkryj i skorzystaj z różnych wygodnych metod płatności dostępnych na stronie realizacji zamówienia.
Our advantages
  • Ochrona zamówienia: Jeśli Twoje zamówienie zostanie zgubione, gwarantujemy wymianę lub zwrot pieniędzy. Obowiązują warunki.
  • Łatwe zwroty: Ciesz się prostym i bezproblemowym procesem zwrotu.
  • Elastyczne płatności: Wybierz spośród wielu bezpiecznych metod płatności dopasowanych do Twoich potrzeb.
  • Najlepsze ceny: Uzyskaj najlepszą wartość dla wszystkich naszych produktów.
Description

THERE ARE TWO VERSION OF V4S: V4S AND V4S-IR.

THE V4S CAN CONTROL THREE DIFFERENT SCRIPTS USING THREE BUTTONS.

THE IR VERSION CAN CONTROL 21 DIFFERENT DUCKY SCRIPTS USING AN INFRARED REMOTE CONTROL.(

DUE TO THE USE OF THE INFRARED FUNCTIONALITY, THE ORIGINAL THREE BUTTONS HAVE BEEN DISABLED.)

 

UPDATE LOG

  • D&B Watch V4-> Deauther Watch V4S(Name changed)
  • Micro USB -> Type-C USB
  • power supply updated(Press and hold for 3 seconds to power on/off.)
  • SD slot added
  • Fully support Ducky Script
  • ESP07S(1M)->ESP07(4M)

WHAT IS IT?

It is a hacker watch.You can attempt deauther attacks and bad USB attacks on this watch. emember, this is just a learning platform. All the source code is on the SD card. You can visit deauther.com to learn about deauther, visit ha5.org to learn about ducky script.

FUNCTION

  • Deauther Attack: Disconnect 2.4G WiFi
  • Deauther Beacon: Create fake networks
  • Deauther Probe: Confuse WiFi trackers
  • Packet Monitor: Display WiFi traffic
  • Clock: Real Time Clock Adjustable
  • Bad USB Attack: The Human Interface Device (HID) Attack

V4S PACKAGE INCLUDED

  • 1x Deauther Watch V4S
  • 1x TypeC Power Cable
  • 1x Arcylic Cover Board
  • 1x SoftWare Manual

V4S-IR VERSION PACKAGE INCLUDED

  • 1x Deauther Watch V4S IR version
  • 1x Infrared Remote Control
  • 1x TypeC Power Cable
  • 1x Arcylic Cover Board
  • 1x SoftWare Manual

DISCLAIMER

This project serves as a proof of concept for testing and educational purposes. It is important to note that neither the ESP8266 nor its SDK were intended or developed for such purposes. As a result, bugs may occur. Please ensure that you only use this project against your own networks and devices. Prior to usage, it is essential to review and comply with the legal regulations pertaining to your country. We do not accept any responsibility for any actions taken with this program.

MORE INFO

Deauth

The deauthentication feature is designed to close the connection of WiFi devices by sending deauthentication frames to the selected access points and client devices. It's important to note that this attack is only possible because many devices do not implement the 802.11w-2009 standard, which provides protection against such attacks.

To ensure proper usage, please select only one target at a time. If you select multiple targets running on different channels and initiate the attack, the system will rapidly switch between those channels, making it difficult to reconnect to the access point hosting the web interface.

Beacon

Beacon packets are used to advertise access points. By continuously sending beacon packets out, it will look like you created new WiFi networks. You can specify the network names under SSIDs.

Probe

Probe requests are sent by client devices to ask if a known network is nearby. Use this attack to confuse WiFi trackers by asking for networks that you specified in the SSID list. It's unlikely you will see any impact by this attack with your home network.

Bad USB

A HID (Human Interface Device) attack is a type of cyberattack that leverages a device, often designed to mimic a keyboard or mouse, to exploit vulnerabilities in a computer system or network. This attack method takes advantage of the fact that most computer systems inherently trust input from HID devices, such as keyboards and mice.

Products questions
Ask question

No questions yet

Reviews

No reviews found

You may be interested
  • Similar products
  • Most Popular
  • On Sale
  • Recently Viewed
 
USRP-Geräte
Finde dein USRP noch heute.
Jetzt einkaufen.
NanoVNA-FV3
Best Value Analyzer.
Start analyzing with confidence.
Buy
HackRF H4MClifford Edition
Compact. Capable.
Clifford delivers more.
Buy
Fast and high quality delivery

We deliver products internationally.

Quality assurance and service

We offer only those goods, in which quality we are sure

Returns within 14 days

You have 14 days to test your purchase