Results 1 to 50 of 583

Thread: WPS Pixie Dust Attack (Offline WPS Attack)

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #11
    WoW

    I am so glad to see this screenshot
    The first "public" pixie dust attack... "sometimes dreams comes true"
    Great job wiire ....

    For the cheksum maybe the fastest will be to have a full pin diccionnary and just "grep" (grab) from the file the second half for PSK2 brute force instead of genrating the cheksum live.
    I do not want to make you loose your time, i am very bad at maths and with number.
    i get the process but i have difficulties to "see concretly the element involved"
    I will try and have a look at your code to try to understand but i do not know C

    Would you mind to tell me (us) in this example which part of "auth key" is used for genrating the HMAC256 (e-hash) ?
    i guess it is the same lenght that is used to create the string for PKE and PKR and that the process is the same... could you confirm that to me?

    Could you tel us also which tp-link model is it concretly and the wifi chipset that it uses?
    Could you pass me a probe response from your routeur? i would like to start a kind of data base for everybody where we list affceted devices.


    Thank you for sharing with us your work and congratulation
    Last edited by kcdtv; 2015-03-19 at 14:52.

Similar Threads

  1. WPS Pixie Dust Attack (Offline WPS Attack)
    By soxrok2212 in forum General Archive
    Replies: 353
    Last Post: 2015-05-05, 08:32
  2. Reaver modfication for Pixie Dust Attack
    By t6_x in forum General Archive
    Replies: 81
    Last Post: 2015-05-05, 00:55
  3. Pixiewps: wps pixie dust attack tool
    By wiire in forum General Archive
    Replies: 89
    Last Post: 2015-05-04, 19:32

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •