Skip to content

Bringing back WPS PIN Attack

Compare
Choose a tag to compare
@derv82 derv82 released this 25 Aug 02:51
· 14 commits to master since this release

In this version, Wifite will attempt the WPS PIN attack (guessing < 11,000 PINs) after Pixie-Dust fails on WPS-enabled networks.

Wifite summarizes the Reaver (or Bully) output into a single line (updated every second). This includes:

  • Number of PINs tried (Number of PINs remaining for --bully)
  • Time running (or estimated time remaining for --bully)
  • Current status (Trying a PIN, sending packets, etc)
  • The number of WPS Timeouts, number of WPS Failures, and if the AP is locked.

There's some new options as well:

  • --bully to use bully instead of reaver when doing the Pixie-Dust or PIN Attacks.
  • --pixie to avoid the PIN attack and use Pixie-Dust only.
  • --no-pixie to skip Pixie-Dust and only do WPS PIN attacks.

Some other changes regarding "Locked" WPS networks:

  • Locked networks are no longer hidden; these targets say lock in the WPS column of the targets list.
  • Wifite will stop WPS attacks (Pixie or PIN) if the AP is Locked.
    • But you can continue attacking Locked networks using the --ignore-lock option.