aboutsummarylogtreecommitdiffstats
path: root/README.md
blob: e363ba1695b36281fd4f056279c99b2eb145b78b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
wpscrack
========
PoC implementation of a brute force attack against WPS - PIN External Registrar

My test environment was Backtrack 5R1 + an Atheros USB adapter.
I used a mac80211/carl9170 driver but any mac80211-based driver should be ok.

Original version: Stefan Viehböck  
Minor improvements: Michael Löffler

Dependencies
------------
* PyCrypto
* Scapy (2.2.0) (does not come with Backtrack)

Usage
-----
    iwconfig mon0 channel X
    ./wpscrack.py --iface mon0 --client 94:0c:6d:88:00:00 --bssid f4:ec:38:cf:00:00 --ssid testap -v

Show further usage parameters:

    ./wpscrack.py --help

References
----------
http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/
http://download.microsoft.com/download/a/f/7/af7777e5-7dcd-4800-8a0a-b18336565f5b/WCN-Netspec.doc
http://hostap.epitest.fi/wpa_supplicant/