For those either new to pixiewps 1.3 and reaver 1.63 or tryiing to implement these programs a short guide is provided

The data labels in reaver 1.63 text output have been changed

Reaver output pixiewps arguments

Enrollee Nonce = --e-nonce

DH own Public Key = --pkr

DH peer Public Key = --pke

AuthKey = --authkey

E-Hash1 = --e-hash1

E-Hash2 = --e-hash2

Registrar Nonce = --r-nonce

Reaver 1.63 outputs the hex strings with spaces between each hex character in the

string. Pixiewps will not accept the hex string in this format. You can replace

the spaces with colons.

The following would change a string variable with spaces to a text string where

spaces become colons:

ENONCE=${ENONCE// /:}

You can check the hex string variable length with the following:

${#ENONCE}

If your hex strings have spaces or colons then lengths are listed below:

${#ENONCE} = 47

${#PKE} = 575

${#RNONCE} = 47

${#PKR} = 575

${#AUTHKEY} = 95

${#HASH1} = 95

${#HASH2} = 95

wiire provides a logfilter.py program which can extract a pixiedust data sequence

as required by pixiewps1.3 and conducts a mode three attack.

The command line arguments can be found in the following thread along with program download links:

See https://forums.kali.org/showthread.p...e-dust-attack)

MTeams are working on a updated PDDSA(pixiedust data sequence analyzer which will allow other pixiewps modes.


Musket Teams