Bringing back WPS PIN Attack
In this version, Wifite will attempt the WPS PIN attack (guessing < 11,000 PINs) after Pixie-Dust fails on WPS-enabled networks.
Wifite summarizes the Reaver (or Bully) output into a single line (updated every second). This includes:
- Number of PINs tried (Number of PINs remaining for
--bully
) - Time running (or estimated time remaining for
--bully
) - Current status (Trying a PIN, sending packets, etc)
- The number of WPS Timeouts, number of WPS Failures, and if the AP is locked.
There's some new options as well:
--bully
to usebully
instead ofreaver
when doing the Pixie-Dust or PIN Attacks.--pixie
to avoid the PIN attack and use Pixie-Dust only.--no-pixie
to skip Pixie-Dust and only do WPS PIN attacks.
Some other changes regarding "Locked" WPS networks:
- Locked networks are no longer hidden; these targets say
lock
in the WPS column of the targets list. - Wifite will stop WPS attacks (Pixie or PIN) if the AP is Locked.
- But you can continue attacking Locked networks using the
--ignore-lock
option.
- But you can continue attacking Locked networks using the