PixieWPS 1.2.2

Bruteforce offline the WPS pin exploiting the low or non-existing entropy of some APs

  1. Fixed warnings

    Mr. Penguin
    Most of the work was done to clean up the code, support more platforms, remove OpenSSL dependency (finally!) and add more options. This version has been successfully tested under Linux(Debian, Ubuntu), Mac OS X 10.11, Windows (using MinGW), FreeBSD, OpenWrt and Android (as a .bin file).

    Version 1.2.2 has an important bugfix for FreeBSD users (found in 1.2.1).

    Two more PRNG/algorithms for eCos devices (through --mode...
  2. Bug fixes and added more modes

    Mr. Penguin
    Rewritten main loop. Added more modes, options and help. Removed OpenSSL
    dependency. Closed #8, closed #14, closed #18
  3. Minor Changes

    Mr. Penguin
  4. Mac OS X Support

    Mr. Penguin
    and bug fixes
  5. OpenWRT compatibility

    Mr. Penguin
    KingKnuts and Fonz like this.
  6. New features and improvements

    Mr. Penguin
    What's new:
    - The previous attack now is fully implemented
    - AuthKey computation if --dh-small is specified (also in Reaver).
    The data can be gathered from a .cap file (manually)
    - Better input parsing with parameters length check
    - More user friendly. Added some examples of use in the usage screen.
  7. Belkin and D-Link Pwn'd

    Mr. Penguin
    Pixie Dust doesn't just crack Ralink, Broadcom, and Realtek APs but also has another cool feature:

    Code:
    Select All
    -W, --generate-pin
    Default Pin Generator by devttys0 team [1] Belkin [2] D-Link
    TidBit likes this.
  8. Added install and run video

    Mr. Penguin