https://github.com/nikita-yfh/OneShot-C
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
https://github.com/nikita-yfh/OneShot-C
hacking-tool pixie-dust pixiedust pixiewps reaver wifi-hacking wifi-hacking-script wifi-security wpa-cracker wps wps-bruteforce wps-cracker wps-pin wpspin wpspixie
Last synced: about 2 months ago
JSON representation
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
- Host: GitHub
- URL: https://github.com/nikita-yfh/OneShot-C
- Owner: nikita-yfh
- Created: 2021-11-03T12:49:31.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2022-07-17T09:00:08.000Z (almost 3 years ago)
- Last Synced: 2024-11-06T12:56:45.303Z (7 months ago)
- Topics: hacking-tool, pixie-dust, pixiedust, pixiewps, reaver, wifi-hacking, wifi-hacking-script, wifi-security, wpa-cracker, wps, wps-bruteforce, wps-cracker, wps-pin, wpspin, wpspixie
- Language: C
- Homepage:
- Size: 87.9 KB
- Stars: 74
- Watchers: 3
- Forks: 18
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Overview
OneShot-C - implementation of [OneShot](https://github.com/drygdryg/OneShot) on C**OneShot-С** performs [Pixie Dust attack](https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-Offline-WPS-Attack) without having to switch to monitor mode.
# Features
- [Pixie Dust attack](https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-Offline-WPS-Attack);
- integrated [3WiFi offline WPS PIN generator](https://3wifi.stascorp.com/wpspin);
- [online WPS bruteforce](https://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf);
- Wi-Fi scanner with highlighting based on iw;
# Requirements
- [Wpa supplicant](https://www.w1.fi/wpa_supplicant/);
- [Pixiewps](https://github.com/wiire-a/pixiewps);
- [iw](https://wireless.wiki.kernel.org/en/users/documentation/iw).
# Compile
```
make
```
## Usage examples
Start Pixie Dust attack on a specified BSSID:
```
sudo ./oneshot -i wlan0 -b 00:90:4C:C1:AC:21 -K
```
Show avaliable networks and start Pixie Dust attack on a specified network:
```
sudo ./oneshot -i wlan0 -K
```
Launch online WPS bruteforce with the specified first half of the PIN:
```
sudo ./oneshot -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234
```
## Troubleshooting
#### "RTNETLINK answers: Operation not possible due to RF-kill"
Just run:
```sudo rfkill unblock wifi```
#### "Device or resource busy (-16)"
Try disabling Wi-Fi in the system settings and kill the Network manager. Alternatively, you can try running OneShot with ```--iface-down``` argument.
# Acknowledgements
## Special Thanks
* `rofl0r` for initial implementation;
* `Monohrom` for testing, help in catching bugs, some ideas;
* `Wiire` for developing Pixiewps.