Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/chickendrop89/oneshot-extended
OneShot-Extended (WPS penetration testing utility) is a fork of the tool with extra android features
https://github.com/chickendrop89/oneshot-extended
android attack bruteforce penetration-testing pixiedust pixiewps termux wireless wps
Last synced: 2 months ago
JSON representation
OneShot-Extended (WPS penetration testing utility) is a fork of the tool with extra android features
- Host: GitHub
- URL: https://github.com/chickendrop89/oneshot-extended
- Owner: chickendrop89
- Created: 2024-08-08T14:46:29.000Z (6 months ago)
- Default Branch: master
- Last Pushed: 2024-11-09T22:06:41.000Z (2 months ago)
- Last Synced: 2024-11-09T23:17:03.746Z (2 months ago)
- Topics: android, attack, bruteforce, penetration-testing, pixiedust, pixiewps, termux, wireless, wps
- Language: Python
- Homepage:
- Size: 80.1 KB
- Stars: 5
- Watchers: 2
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Overview
**OneShot-Extended** performs the [Pixie Dust attack](https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-Offline-WPS-Attack) without special card or monitor mode.# Features
- [Pixie Dust attack](https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-Offline-WPS-Attack)
- Offline WPS PIN generating algorithm
- [Online WPS bruteforce](https://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf)
- Wi-Fi scanner with highlighting based on iw;
- Ability to save upon success# Requirements
- Python 3.8 and above
- [WPA Supplicant](https://www.w1.fi/wpa_supplicant/)
- [Pixiewps](https://github.com/wiire-a/pixiewps)
- [iw](https://wireless.wiki.kernel.org/en/users/documentation/iw)# Usage
```
Required arguments:
-i, --interface INTERFACE : Name of the interface to useOptional arguments:
-b, --bssid BSSID : BSSID of the target AP
-p, --pin PIN : Use the specified pin (arbitrary string or 4/8 digit pin)
-K, --pixie-dust : Run Pixie Dust attack
-F, --pixie-force : Run Pixiewps with --force option (bruteforce full range)
-B, --bruteforce : Run online bruteforce attack
--pbc, --push-button-connect : Run WPS push button connectionAdvanced arguments:
-d, --delay : Set the delay between pin attempts
--vuln-list VULN_LIST : Use custom file with vulnerable devices list-X, --show-pixie-cmd : Always print Pixiewps command
-w, --write : Write credentials to the file on success
-s, --save : Save the AP to network manager on success
-l, --loop : Run in a loop
-c, --clear : Clear the screen on every wi-fi scan
-r, --reverse-scan : Reverse order of networks in the list of networks. Useful on small displays
--mtk-wifi : Activate MediaTek Wi-Fi interface driver on startup and deactivate it on exit (for internal Wi-Fi adapters implemented in MediaTek SoCs).
: Turn off Wi-Fi in the system settings before using this.
--iface-down : Down network interface when the work is finished
-v, --verbose : Verbose output
-h, --help : show this help message and exit
```# Installation
## Termux
**Please note that root access is required.****Installing requirements**
```shell
pkg install -y root-repo
pkg install -y git tsu python wpa-supplicant pixiewps iw openssl
```
**Getting OneShot**
```shell
cd ~
git clone --depth 1 https://github.com/chickendrop89/OneShot-Extended OneShot
```
**Running**
```shell
sudo python OneShot/oneshot.py -i wlan0
```## Linux distributions
**Install these packages through your distro's package manager:**
```shell
python3 wpa-supplicant iw wget pixiewps
```
**Getting OneShot**
```shell
cd ~
git clone https://github.com/chickendrop89/OneShot-Extended OneShot
```
**Running**
```shell
sudo python OneShot/oneshot.py -i wlan0
```-----
## Usage examples
Start Pixie Dust attack on a specified BSSID:
```shell
sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -K
```
Show avaliable networks and start Pixie Dust attack on a specified network:
```shell
sudo python3 oneshot.py -i wlan0 -K
```
Launch online WPS bruteforce with the specified first half of the PIN:
```shell
sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234
```
Start WPS push button connection:s
```shell
sudo python3 oneshot.py -i wlan0 --pbc
```-----
## Troubleshooting
**"RTNETLINK answers: Operation not possible due to RF-kill"**
Just run:
- ```sudo rfkill unblock wifi```**"Device or resource busy (-16)"**
- Try disabling Wi-Fi in the system settings and kill the Network manager. Alternatively, you can try running OneShot with ```--iface-down``` argument.**The wlan0 interface disappears when Wi-Fi is disabled on Android devices with MediaTek SoC**
- Try running OneShot with the `--mtk-wifi` flag to initialize Wi-Fi device driver.-----
# Acknowledgements
## Special Thanks
* `kimocoder, drygdryg, chickendrop89` for extended implementation
* `rofl0r` for initial implementation;
* `Monohrom` for testing, help in catching bugs, some ideas;
* `Wiire` for developing Pixiewps.-----
> [!WARNING]
> This tool is intended for educational and authorized penetration testing purposes only.
> It is not designed for, and must not be used for, illegal activities such as hacking, unauthorized access, or causing damage to systems or networks.
> By using this tool, you agree to use it responsibly and ethically, and to comply with all applicable laws and regulations.
> The developer assumes no responsibility for any misuse of this tool.