https://github.com/kcdtv/wpscrack
wpscrack, the first wps brute force tool
https://github.com/kcdtv/wpscrack
crack linux linux-shell python security wifi wifi-hacking wifi-network wifi-security wps
Last synced: 7 months ago
JSON representation
wpscrack, the first wps brute force tool
- Host: GitHub
- URL: https://github.com/kcdtv/wpscrack
- Owner: kcdtv
- License: gpl-3.0
- Created: 2017-06-22T20:26:43.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2022-03-21T15:55:11.000Z (over 3 years ago)
- Last Synced: 2025-04-01T06:12:26.805Z (8 months ago)
- Topics: crack, linux, linux-shell, python, security, wifi, wifi-hacking, wifi-network, wifi-security, wps
- Language: Python
- Homepage:
- Size: 21.5 KB
- Stars: 8
- Watchers: 2
- Forks: 6
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# wpscrack
This is a copy of the original code from **Stefan Viehböck**
The orignal dropbox download is down, the link was posted in Stefan's blog: https://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/
**wpscrack** was the first tool to perform WPS PIN brute force attacks.
It was published the 29th of December 2011.
It was developed in backtrack with an ar9170 chipset and does not support a lot of devcies.
It was more conceived as a PoC then as a "final tool"
All credits for the WPS PIN brute force vulnerability and wpscrack go to **Stefan Viehböck**
_Original readme file by **Stefan Viehböck**_
PoC implementation of a brute force attack against WPS - PIN External Registrar
My test environment was Backtrack 5R1 + an Atheros USB adapter.
I used a mac80211/carl9170 driver but any mac80211-based driver should be ok.
DEPENDENCIES:
`PyCrypto`
`Scapy (2.2.0)` (does not come with Backtrack)
USAGE:
`iwconfig mon0 channel X`
`./wpscrack.py --iface mon0 --client 94:0c:6d:88:00:00 --bssid f4:ec:38:cf:00:00 --ssid testap -v`
further usage:
`./wpscrack.py --help`
REFERENCES:
http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/
http://download.microsoft.com/download/a/f/7/af7777e5-7dcd-4800-8a0a-b18336565f5b/WCN-Netspec.doc
http://hostap.epitest.fi/wpa_supplicant/