Results 1 to 50 of 244

Thread: Pixiewps: wps pixie dust attack tool

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Join Date
    2015-Apr
    Posts
    12
    Quote Originally Posted by soxrok2212 View Post
    So basically D-Link devices just use 12345670?
    Not all Dlink uses RTL8671. From what I have tested, DSL 2750U pixiewps outputs 12345670 as PIN but reaver is unable to retrieve the passphrase using this pin. However jumpstart is able to retrieve the passphrase using that PIN in Windows. I can confirm that this PIN doesn't work on DIR devices but confirmed working on DSL 2730U & DSL 2750U. I have not tested it on other Dlink DSL routers.
    Last edited by DetmL; 2015-10-12 at 00:41. Reason: Spelling error

  2. #2
    jumpstat doesn't do anything special.
    Try to add -n to yor reaver line, you should recover the wpa key.
    Otherwise use wpa_cli to connect "normaly" through WPS,
    That the normal way to use WPS in Linux.

  3. #3
    Join Date
    2015-Oct
    Posts
    8
    So following that post..
    I have a question..

    Does the PKR value of the same AP change ?

    My work network is Cisco Linksys E900 v1 FW: 1.0.0.0
    on bruting it, it locks up on every 9 successful incorrect pins for 60 seconds and then for 10 seconds or so for every 3 incorrect pins.. and the cycle continues.
    Its non-exponential.

    Howwver, the strange bit is : its PKR value has changed two times.
    First time it was some huge BE:3f:4c.......
    Second time it was something else.. cant rem:
    Now its 00:00:00:00:00:00:...............:00:00:00:02 (all zeroes and last digit 2)

    Im using the -vvv with reaver.. and trying to manually input values in PD. so this caught my attention.
    Again im unable to post the log(s).. as sucuri website firewall doesnt allow me to.

  4. #4
    Join Date
    2013-Jul
    Location
    United States
    Posts
    520
    Quote Originally Posted by rho View Post
    So following that post..
    I have a question..

    Does the PKR value of the same AP change ?

    My work network is Cisco Linksys E900 v1 FW: 1.0.0.0
    on bruting it, it locks up on every 9 successful incorrect pins for 60 seconds and then for 10 seconds or so for every 3 incorrect pins.. and the cycle continues.
    Its non-exponential.

    Howwver, the strange bit is : its PKR value has changed two times.
    First time it was some huge BE:3f:4c.......
    Second time it was something else.. cant rem:
    Now its 00:00:00:00:00:00:...............:00:00:00:02 (all zeroes and last digit 2)

    Im using the -vvv with reaver.. and trying to manually input values in PD. so this caught my attention.
    Again im unable to post the log(s).. as sucuri website firewall doesnt allow me to.
    The specification may seem backwards, but upon understanding how the whole thing works, the registrar is the entity looking to join the network (YOU) and the enrollee is the AP.

    That being said, you as the attacker (or device looking to join) are generating the PKR. If you use -S in Reaver (small DH Keys), then Reaver will generate a PKR with a value of 00:00:00:00.....:00:00:00:02. I generally try to avoid using -S when pixie dusting now (and it WILL NOT even work with Realtek access points) so unless you are running a standard Reaver attack, there is no need for it. Otherwise, Reaver will select a random private number and will generate a random PKR value like the first time you tried.

    Also note that your router, Linksys E900, uses a Broadcom BCM5357C0 wireless chip which is not currently vulnerable to pixiewps: https://wikidevi.com/wiki/Linksys_E900
    Last edited by soxrok2212; 2015-10-31 at 15:53.

  5. #5
    Join Date
    2015-Oct
    Posts
    8
    Oh, ok.. lol
    Got mixed up with the PKR and PKE.
    Thankyou for clearing it.

    @ Mteam,
    will try that next.

Similar Threads

  1. Data gathering for pixiewps (pixie dust attack)
    By wiire in forum Project Archive
    Replies: 16
    Last Post: 2018-07-24, 01:42
  2. WPS Pixie Dust Attack (Offline WPS Attack)
    By soxrok2212 in forum General Archive
    Replies: 353
    Last Post: 2015-05-05, 08:32
  3. Pixiewps: wps pixie dust attack tool
    By wiire in forum General Archive
    Replies: 89
    Last Post: 2015-05-04, 19:32

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •