On 2019/03/19 23:17, Sebastian Reitenbach wrote:
> Hi,
> 
> attached port implements the pixie-dust attack against WPS keys.
> Yes, that attack is old, but vulnerable APs are still out there.
> 
> tested on i386 with reaver with athn(4) interface.
> 
> cat pkg/DESCR
> Pixiewps is a tool written in C used to bruteforce offline the WPS PIN 
> exploiting the low or non-existing entropy of some software implementations, 
> the so-called "pixie-dust attack" discovered by Dominique Bongard in summer 
> 2014. It is meant for educational purposes only.
> 
> As opposed to the traditional online brute-force attack, implemented in tools 
> like Reaver or Bully which aim to recover the pin in a few hours, this method 
> can get the PIN in only a matter of seconds or minutes, depending on the 
> target, if vulnerable.
> 
> comments, concerns, tests or OKs welcome.
> 
> cheers,
> Sebastian
> 
>  Pixiewps 1.4
> 
>  [?] Mode:     3 (RTL819x)
>  [*] Seed N1:  1368013235 (Wed May  8 11:40:35 2013 UTC)
>  [*] Seed ES1: 1368013238 (Wed May  8 11:40:38 2013 UTC)
>  [*] Seed ES2: 1368013238 (Wed May  8 11:40:38 2013 UTC)
>  [*] PSK1:     326138cf082aad7bb7b48e9f912e398c
>  [*] PSK2:     dd86e6f4a2fced0080b3b66ffdcff6c8
>  [*] ES1:      50401527275f5eb53fdb296f519d419d
>  [*] ES2:      50401527275f5eb53fdb296f519d419d
>  [+] WPS pin:  46681348
> 
>  [*] Time taken: 552 s 640 ms



"Don't hardcode -O3 and allow overriding CFLAGS and MANDIR"

- just pass them both in MAKE_FLAGS and/or FAKE_FLAGS, you don't need to
patch for this in the usual case.


Reply via email to