Authors :
Akash Kumar; Balwant Yadav; Aniket Jopre; Dr. Monika Deshmukh
Volume/Issue :
Volume 10 - 2025, Issue 3 - March
Google Scholar :
https://tinyurl.com/mw2pny8p
Scribd :
https://tinyurl.com/yp7ps332
DOI :
https://doi.org/10.38124/ijisrt/25mar337
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
In the rapidly evolving landscape of cybersecurity threats, multi-protocol communication devices play a crucial
role in penetration testing and security research. This paper presents a Multi-Protocol Communication and Security System
using ESP8266/32, designed to explore cybersecurity vulnerabilities across different communication protocols, including
WiFi, RF, and RFID. The project encompasses four distinct tools: Cyberduck (WiFi Rubber Ducky), Signal Spy (RF Signal
Scanning and Replay), ZapTag (RFID Reading, Writing, and Cloning), and ARP Spoofer (Network Scanning and ARP
Spoofing). Each tool is developed for ethical hacking, security testing, and research purposes. This paper discusses the
hardware and software implementation, security implications, and future improvements.
Keywords :
ESP8266, ESP32, Cybersecurity, Penetration Testing, WiFi Rubber Ducky, RFID Cloning, RF Signal Replay, ARP Spoofing.
References :
- E. Espina and R. Santamarta, “Exploiting vulnerabilities in IoT communication protocols,” Proc. IEEE Int. Conf. Cybersecurity, vol. 5, pp. 45-58, March 2020.
- R. F. Medina and L. S. Cooper, “WiFi security testing using ESP8266 and ESP32,” in IoT Security Research, vol. II, P. Harris and J. Wilson, Eds. Cambridge: MIT Press, 2021, pp. 89-103.
- D. Garcia and M. Lang, “Pentesting embedded systems with low-cost microcontrollers,” IEEE Internet Things J., vol. 4, pp. 195-209, July 2019.
- T. Johnson, “Development of an open-source IoT security assessment toolkit,” unpublished.
- B. Patel, “ESP32-based network penetration testing framework,” J. Cyber Threat Intell., in press.
- Y. Nakamura, H. Fujimoto, and K. Tanaka, “Analysis of wireless hacking techniques using ESP32,” IEEE Transl. J. Cybersecurity Japan, vol. 3, pp. 567-573, November 2021 [Digests 12th Annual Conf. Cybersecurity Japan, p. 98, 2020].
- M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
In the rapidly evolving landscape of cybersecurity threats, multi-protocol communication devices play a crucial
role in penetration testing and security research. This paper presents a Multi-Protocol Communication and Security System
using ESP8266/32, designed to explore cybersecurity vulnerabilities across different communication protocols, including
WiFi, RF, and RFID. The project encompasses four distinct tools: Cyberduck (WiFi Rubber Ducky), Signal Spy (RF Signal
Scanning and Replay), ZapTag (RFID Reading, Writing, and Cloning), and ARP Spoofer (Network Scanning and ARP
Spoofing). Each tool is developed for ethical hacking, security testing, and research purposes. This paper discusses the
hardware and software implementation, security implications, and future improvements.
Keywords :
ESP8266, ESP32, Cybersecurity, Penetration Testing, WiFi Rubber Ducky, RFID Cloning, RF Signal Replay, ARP Spoofing.