Results 1 to 50 of 123

Thread: Wifite including new pixiewps attack

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #11
    Join Date
    2015-Mar
    Posts
    127
    Quote Originally Posted by aanarchyy View Post
    What behavior were you thinking for the spoofing part?


    Specify address to spoof at command line?
    Wait until client found then start attack with spoofed address?
    Start attacking unspoofed and watch at same time, and when client found, restart attack with spoofed address?
    If multiple clients found, rotate addresses so often?
    For now
    wifite -mac
    Check mon0 is actually spoofed or random. airmon-ng doesn't carry spoofed mac to monitor. macchanger needs to also be carried out on mon0.
    macchanger on wlan only, not sufficient.
    also
    reaver use --mac option, spoofed/random mac
    aireplay-ng use -h option spoofed/random mac

    Down the road:
    wifite -clients (only attack access points with connected clients, spoof client b4 any attacks)

    any deauths use connected clients mac
    Last edited by nuroo; 2015-04-22 at 01:42.

Similar Threads

  1. Pixiewps: wps pixie dust attack tool
    By wiire in forum Project Archive
    Replies: 243
    Last Post: 2017-11-09, 19:31
  2. Bully modified to implement pixiewps attack
    By aanarchyy in forum Project Archive
    Replies: 65
    Last Post: 2017-04-17, 21:21
  3. Replies: 26
    Last Post: 2016-08-17, 09:34
  4. Wifite including new pixiewps attack
    By aanarchyy in forum General Archive
    Replies: 75
    Last Post: 2015-05-04, 23:16
  5. Pixiewps: wps pixie dust attack tool
    By wiire in forum General Archive
    Replies: 89
    Last Post: 2015-05-04, 19:32

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •