Skip to main content
AP (Access Point) Mode turns the ESP32-C6 into its own Wi-Fi hotspot. No existing router or network infrastructure is required — the ESP32 broadcasts the HACK_DEMO network, and every device in the demo (your PC, phone, or tablet) connects directly to it. This makes setup faster and the environment fully self-contained. Use AP Mode for live presentations, portable demos, or any scenario where you cannot rely on an external network.

AP Credentials

SettingValue
SSIDHACK_DEMO
Passwordnone (open)
ESP32 IP192.168.4.1
The IP address 192.168.4.1 is assigned automatically by the ESP32’s built-in DHCP server and never changes in AP mode.
The AP Mode firmware calls WiFi.softAP(ap_ssid) with only the SSID argument, which creates an open (unsecured) hotspot. The ap_password variable is defined in the source but is not passed to softAP(). Any device within range can join HACK_DEMO without a password — keep the ESP32 powered only during controlled testing.

Network Topology

┌──────────────────────────────┐
│  ESP32 Hotspot (AP Mode)     │
│  SSID: HACK_DEMO             │
│  IP: 192.168.4.1             │
└──────────┬───────────────────┘

           ├─ PC (192.168.4.2)
           │  [Listener Running]

           └─ Phone/Tablet
              [Web Interface]

ESP32 Setup

1

Open the AP Mode sketch

Open ESP32Wifi/ESP32Wifi.ino in Arduino IDE with the ESP32C6 Dev Module board selected.
2

Upload the sketch

Connect the ESP32-C6 via USB-C and click Upload. There are no Wi-Fi credentials to configure — AP Mode uses the hardcoded values HACK_DEMO / 12345678 defined at the top of the sketch.
3

Confirm the hotspot is ready

Watch the onboard LED: it starts blue during boot and switches to green once the hotspot is broadcasting and the web server is running.
4

Verify in Serial Monitor

Open Serial Monitor at 115200 baud. The board prints:
[✓] Hotspot açıldı!
[✓] IP     : 192.168.4.1
The AP IP is always 192.168.4.1.

PC Listener Setup

1

Connect your PC to HACK_DEMO

Open your PC’s Wi-Fi settings and connect to HACK_DEMO. The hotspot is open — no password is required. Your PC will receive an address in the 192.168.4.x range (typically 192.168.4.2).
2

Open the listener script

Open ESP32Wifi/dinleyici_wifi.py in your editor.
3

Set the target folder path

Update KLASOR_YOLU to point at the folder you want deleted on the target machine. The script ships with the placeholder value r"C:\kurban_klasor" — replace it with your actual target path:
KLASOR_YOLU = r"C:\kurban_klasor"   # replace with your target folder
The script checks that this path exists before it starts polling — it exits immediately with an error if the folder is missing.
4

Run as Administrator

Open PowerShell or CMD as Administrator and run:
python dinleyici_wifi.py
5

Confirm the script is waiting

The script validates the target folder and then enters its polling loop, printing:
[HAZIR] Sinyal bekleniyor... Klasör şu an güvende.
Current status is shown as BEKLE while no trigger has been sent.
6

Open the control panel on a phone or tablet

Connect your phone or tablet to HACK_DEMO. Open a browser and navigate to http://192.168.4.1/tetikle, or visit http://192.168.4.1 and press the trigger button on the control panel.
7

Observe deletion and confirmation

The ESP32 LED turns red, the /durum endpoint returns SIL, and the listener deletes the target folder via shutil.rmtree. The script prints:
[✓] HEDEF YOK EDİLDİ!
    Sunum tamamlandı.

API Reference

Trigger the destruction sequence directly from the command line:
curl http://192.168.4.1/tetikle
Returns an HTML “SİSTEM İHLALİ” (system breach) confirmation page and sets the internal state to SIL on the ESP32. Any subsequent call to /durum will return SIL. You can also drive it from Python:
import requests
requests.get("http://192.168.4.1/tetikle")
EndpointMethodDescription
/GETControl panel web interface
/durumGETReturns BEKLE or SIL
/tetikleGETArms the delete command, LED turns red
/sifirlaGETResets status to BEKLE, LED turns green

LED Status

ColorMeaning
BlueStartup
GreenHotspot ready — waiting for trigger
RedSIL received — destruction running
AP Mode is ideal for presentations because it requires no existing network infrastructure. You carry the entire environment on the ESP32 itself — just power it on, connect your devices to HACK_DEMO, and the demo is ready to run in under a minute, anywhere.

Build docs developers (and LLMs) love