/wpscrack

Continuation of wpscrack originally written by Stefan Viehböck

Primary LanguagePython

wpscrack

PoC implementation of a brute force attack against WPS - PIN External Registrar

My test environment was Backtrack 5R1 + an Atheros USB adapter. I used a mac80211/carl9170 driver but any mac80211-based driver should be ok.

Original version: Stefan Viehböck
Minor improvements: Michael Löffler

Dependencies

  • PyCrypto
  • Scapy (2.2.0) (does not come with Backtrack)

Usage

iwconfig mon0 channel X
./wpscrack.py --iface mon0 --client 94:0c:6d:88:00:00 --bssid f4:ec:38:cf:00:00 --ssid testap -v

Show further usage parameters:

./wpscrack.py --help

References

http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/ http://download.microsoft.com/download/a/f/7/af7777e5-7dcd-4800-8a0a-b18336565f5b/WCN-Netspec.doc http://hostap.epitest.fi/wpa_supplicant/