Nyan Box · Volume 4

Nyan Box Volume 4 — Wi-Fi and BLE Toolset

The ESP32-radio tools — Wi-Fi network analysis, client detection, beacon work, BLE scan/spoof, BT Classic scan

Contents

SectionTopic
1About this volume
2Wi-Fi tools
3BLE + BT Classic tools
4The tool catalog at a glance
5How these compare to ESP32 Marauder
6Education-mode framing of these tools
7Resources

1. About this volume

Vol 4 covers the nyanBOX tools that run on the ESP32’s own radio — Wi-Fi 2.4 GHz and Bluetooth (BLE + Classic). These are the “conventional” half of the nyanBOX tool catalog; they overlap heavily with ESP32 Marauder, Bruce, and every other ESP32-pentest firmware. The NRF24-specific tools are Vol 5; the two unique features (RemoteID, camera detection) are Vols 6-7.

Cross-reference: the canonical engineer-grade reference for ESP32 Wi-Fi/BLE pentest mechanics is the ESP32 Marauder Firmware deep dive (). The frame-level anatomy of deauth, the PMKID attack, the BLE channel structure, captive-portal mechanics — all live there in full. This volume covers what the nyanBOX specifically exposes and how its education-first wrapper presents it, citing the Marauder deep dive for the underlying mechanics rather than re-authoring.


2. Wi-Fi tools

A typical ESP32 development board — the same SoC family the nyanBOX's WROOM-32U module is built on. Every Wi-Fi and Bluetooth tool in this volume runs on the ESP32's own radio; the nyanBOX is, at t…
A typical ESP32 development board — the same SoC family the nyanBOX's WROOM-32U module is built on. Every Wi-Fi and Bluetooth tool in this volume runs on the ESP32's own radio; the nyanBOX is, at the Wi-Fi/BLE level, an ESP32 with a purpose-built menu UI wrapped around it.

Figure 4.1 — ESP32 development board (representative). Photo: File:ESP32 Dev Board.jpg by Edwiyanto. License: CC BY-SA 4.0. Via Wikimedia Commons.

The ESP32-WROOM-32U does 2.4 GHz 802.11 b/g/n. In promiscuous mode it’s a monitor-mode capture device; in AP/STA modes it can inject. The nyanBOX’s Wi-Fi tool group:

2.1 Network analysis / scan

   nyanBOX Wi-Fi Scan — OLED view
   ════════════════════════════════
   ┌────────────────────────────────┐
   │ WiFi Scan        14 APs  87%   │
   ├────────────────────────────────┤
   │ > HOME-5A24    -41  ch6   WPA2 │
   │   xfinitywifi  -58  ch1   open │
   │   IoT_Cam_3F   -52  ch6   WPA2 │
   │   [hidden]     -67  ch11  WPA2 │
   │   guest-net    -71  ch1   WPA2 │
   ├────────────────────────────────┤
   │ [OK] detail [↓] more [←] back  │
   └────────────────────────────────┘
ToolWhat it doesUnderlying mechanic
AP scanEnumerate access points — SSID, BSSID, channel, RSSI, encryptionPassive beacon-frame capture
Client / station detectionFind devices associated to APsMonitor-mode capture of data + probe frames
Probe-request captureLog devices probing for known SSIDsMonitor-mode; reveals device SSID history
Channel surveyPer-channel activity / congestionHop channels, count frames

2.2 Beacon work

ToolWhat it doesNotes
Beacon spamBroadcast many fake AP beaconsThe “fill the Wi-Fi list with junk” demo; harmless-looking but disruptive
Beacon cloneMimic a specific AP’s beaconFoundation of evil-twin work
SSID floodMass-broadcast SSID namesA subset of beacon spam

2.3 Active Wi-Fi tools

ToolWhat it doesPosture note
DeauthSend deauthentication frames to disconnect clientsDisruptiveVol 11 § 3 covers the legal line; likely XP-gated (Vol 8 § 4)
Evil portal / captive portalSoftAP + captive-portal page to capture credentialsDisruptive + credential-capture — authorization required
Probe-response / KarmaRespond to probe requests to lure clientsDisruptive

Posture callout: the active Wi-Fi tools (deauth, evil portal, Karma) are disruptive and in many jurisdictions illegal without authorization. The nyanBOX’s education-first design likely XP-gates these — a learner has to progress through passive tools first. For tjscientist, the gate is friction (Vol 8 § 4 covers bypass); the legal line is not — see Vol 11.

2.4 What the nyanBOX Wi-Fi tools do NOT do

Not availableWhyWhere to look
5 GHz Wi-FiESP32-WROOM-32U is 2.4 GHz onlyAWOK ESP32 C5, Banshee
WPA handshake → host crackThe nyanBOX captures; cracking is a host-PC jobCapture, pull over USB, hashcat on host (cross-ref [Marauder deep dive Vol 9](../../ESP32%20Marauder%20Firmware/03-outputs/ESP32_Marauder_Firmware_Complete.html#vol09))
Deep packet inspection128×64 OLED + ESP32 RAM limits thisCapture + offline analysis

3. BLE + BT Classic tools

The ESP32 (original, not S3/C3) has both BLE and Bluetooth Classic — a capability the newer ESP32-S3 lacks. The nyanBOX inherits this.

3.1 BLE tools

ToolWhat it doesUnderlying mechanic
BLE scanEnumerate BLE devices — address, name, RSSI, advertised servicesPassive advertisement capture on ch37/38/39
BLE spoofAdvertise as a chosen device — name, address, service UUIDsCrafted advertisement injection
BLE spamMass BLE advertisements (the “Apple/Android popup spam” family)Advertisement flooding
Device trackingFollow a BLE device by address + RSSI over timeRepeated advertisement capture

3.2 BT Classic tools

ToolWhat it doesNotes
BT Classic scanDiscover Bluetooth Classic (BR/EDR) devicesThe original ESP32 can do this — the S3 cannot
BT Classic device infoClass-of-device, name, servicesInquiry-based

3.3 Why BT Classic matters

Most modern ESP32-pentest hardware is moving to the ESP32-S3 (faster, native USB, more RAM) — but the S3 dropped Bluetooth Classic. It’s BLE-only. The original ESP32 in the nyanBOX still has BT Classic. The practical consequence:

  • The nyanBOX can scan/discover legacy Bluetooth Classic devices (older headsets, car kits, industrial gear, classic-BT IoT) that an S3-based device simply can’t see
  • This is a small but genuine capability advantage over the ESP32-S3-based Game Over for BT Classic recon

3.4 The BLE-spam ethics note

BLE spam (the “device pairing popup flood” family — Sour Apple, Swift Pair spam, etc.) is in the catalog. It is disruptive and increasingly regulated — some jurisdictions treat it as harassment / interference. The nyanBOX likely XP-gates it. Vol 11 § 4 covers the posture. The [Marauder deep dive Vol 6](../../ESP32%20Marauder%20Firmware/03-outputs/ESP32_Marauder_Firmware_Complete.html#vol06) covers why mainline Marauder deliberately omits the worst BLE-spam variants — worth reading for the ethical context.


4. The tool catalog at a glance

The vendor advertises “40+ tools”. Here’s the structure of the catalog:

   nyanBOX tool catalog — structure
   ══════════════════════════════════

   ┌─ Wi-Fi ──────────────────┐  ┌─ BLE / BT ───────────────┐
   │ AP scan                  │  │ BLE scan                 │
   │ Client detection         │  │ BLE spoof                │
   │ Probe-request capture    │  │ BLE spam                 │
   │ Channel survey           │  │ Device tracking          │
   │ Beacon spam / clone      │  │ BT Classic scan          │
   │ Deauth                   │  │ BT Classic device info   │
   │ Evil portal              │  └──────────────────────────┘
   │ Karma / probe-response   │
   └──────────────────────────┘  ┌─ NRF24 / 2.4 GHz ────────┐
                                 │ Spectrum analysis        │
   ┌─ Detection (unique) ──────┐ │ Multi-channel sniff      │
   │ Drone RemoteID    → Vol 6 │ │ Jam                      │
   │ Hidden camera     → Vol 7 │ │ Replay                   │
   └──────────────────────────┘  │ Mousejack-class tools    │
                                 │ Transmit-and-confirm     │  → Vol 5
   ┌─ System / education ──────┐ └──────────────────────────┘
   │ XP progression view       │
   │ Device lock               │
   │ Settings                  │
   │ Firmware info             │
   └──────────────────────────┘

   "40+" comes from counting every distinct menu entry across
   all groups. The exact catalog depends on firmware version —
   verify against the vendor GitHub docs for the current list.

[FIGURE SLOT — Vol 4, § 4] Photo of the nyanBOX main menu showing the tool-group structure on the OLED. Source: vendor product page. Caption when filled: “Figure 4.2 — The nyanBOX main menu / tool-group navigation.”


5. How these compare to ESP32 Marauder

The nyanBOX’s Wi-Fi/BLE tools are functionally a subset of ESP32 Marauder’s, wrapped in a friendlier UI. The honest comparison:

DimensionnyanBOX stock firmwareESP32 Marauder
Wi-Fi tool depthSolid, education-framedDeeper — more attack variants, more capture detail
BLE tool depthSolidComparable
BT ClassicYes (original ESP32)Yes (on ESP32, not S3 builds)
UIMenu-driven, XP-scaffolded, beginner-friendlyFlat menu, assumes knowledge
Capture storageEEPROM (small) — limitedmicroSD on Marauder-capable hardware
SourceClosed (likely)Open source
The two unique featuresYes (RemoteID, camera)No
CustomizabilityLow (closed)High (open, forkable)

5.1 The implication

For the Wi-Fi/BLE tools specifically, ESP32 Marauder is the more capable firmware. If tjscientist wanted only Wi-Fi/BLE depth, running Marauder on the nyanBOX hardware (Vol 8 § 5) — or just using the AWOK Dual Touch V3, which already runs Marauder — beats the stock firmware.

The nyanBOX stock firmware earns its place not on Wi-Fi/BLE depth, but on: (a) the two unique detection features, (b) the triple-NRF24 tooling, (c) the education UX. The Wi-Fi/BLE tools are table stakes — present and competent, but not the reason to buy.


6. Education-mode framing of these tools

The nyanBOX’s distinctive presentation of the Wi-Fi/BLE tools:

6.1 The scaffolding

Each tool, in the stock firmware, comes with progression context — the XP system frames why you’d use a tool and what it teaches:

   Education framing — example
   ════════════════════════════

   Tool: "Probe Request Capture"

   Flat-firmware presentation (Marauder):
     > Probe Req Sniff   [start]

   nyanBOX education presentation:
     > Probe Request Capture
       Devices broadcast the names of WiFi networks
       they remember. This tool captures those — and
       shows you how much a phone reveals just by
       being on. [Tier 1: Passive]  XP: +5
       [start]  [learn more]

6.2 Is this valuable for tjscientist?

For a learner: yes, genuinely. The scaffolding turns a tool list into a curriculum.

For tjscientist (45+ years EE): the framing is friction — he knows what a probe request is. But it’s non-destructive friction; the tools still work, you just click past the context. And there’s a real use: the nyanBOX is the device to hand to someone else — a student, a new hire, a curious colleague. In that role, the education framing is the entire point.

6.3 The gate caveat

If the education framing also gates tools (you can’t use deauth until you’ve earned XP on passive tools), that’s friction tjscientist would want to bypass. Vol 8 § 4 covers whether the gate is real and whether it’s bypassable. For now: assume some gating exists; assume it’s bypassable (either via XP grinding, a settings option, or alternative firmware).


7. Resources

Canonical mechanics reference

ESP32 radio

Vendor

End of Vol 4. Next: Vol 5 covers the NRF24 / 2.4 GHz toolset — spectrum analysis, jam, sniff, replay, Mousejack-class tools, and the transmit-and-confirm workflow the triple-radio hardware enables.