Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some APs (pixie dust attack). It is meant for educational purposes only. All credits for the research go to Dominique Bongard.
Whitepaper: https://passwordscon.org/wp-content/uploads/2014/08/Dominique_Bongard.pdf
DEPENDENCIES
Pixiewps requires libssl. To install it:
INSTALLATIONCode:Select Allsudo apt-get install libssl-dev
Pixiewps can be built and installed by running:
USAGECode:Select All~/pixiewps$ cd src ~/pixiewps/src$ make ~/pixiewps/src$ sudo make install
Code:Select AllUsage: pixiewps <arguments> Required Arguments: -e, --pke : Enrollee public key -r, --pkr : Registrar public key -s, --e-hash1 : E-Hash1 -z, --e-hash2 : E-Hash2 -a, --authkey : Key used in HMAC SHA-256 Optional Arguments: -n, --e-nonce : Enrollee nonce -S, --dh-small : Small Diffie-Hellman keys (--pkr not needed) -h, --help : Display this usage screen
PixieWPS 1.2.2
Bruteforce offline the WPS pin exploiting the low or non-existing entropy of some APs
- Watchers:
- This resource is being watched by 741 members.
Recent Updates
- Fixed warnings 6 Jan 2016
- Bug fixes and added more modes 7 Dec 2015
- Minor Changes 2 Aug 2015