A tool to bruteforce WPS pin if AP is vulnerable
Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some Access Points, the so-called "pixie dust attack" discovered by Dominique Bongard in summer 2014. It is meant for educational purposes only.
As opposed to the traditional online bruteforce attack, implemented in tools like Reaver or Bully which aim to recover the pin in a few hours, this method can get the pin in only a matter of milliseconds to minutes, depending on the target, if vulnerable.
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:dantal2000/pixiewps && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000000216 216 Bytes | |
_service:download_url:master.zip | 0000049863 48.7 KB |
Latest Revision
Daniil Talagaev (dantal2000)
committed
(revision 4)
Comments 0