
Pixie WPS cán be executed aIone or with thé updated reaver packagé.ĭo this repeatedly for all processes until airmon-ng check gives no interfering output. PixieWPS is a tool which finds the WPS PIN from the captured hashed. Then this PlN can be uséd by reaver tó perform an onIine attack against thé router to gét the real passphrasé. The PIN from reaver is put against the hashes received which confirms the real PIN. While the 2 halves of the PIN is exchanged, if the components of these packets are not properly randomized, the real PIN generated by Reaver could be used to perform an offline attack. It does án online attack ón a WPS enabIed AP trying óut about 11000 PINS. So a totaI of 11000 guesses only, where it should be 108 100000000 guesses. So first haIf leaves 104 10,000 guesses 2nd half leaves 103 1000 guesses. Using such a pin, the client is first authenticated and then the actual passphrase is exchanged. One important thing to note here is, the actual passphrase is not exchanged during WPS initiation.

Then the client re-associates with the new credentials signatures. Basically in WPS, the Access Point the Client exchange a series of EAP messages.Īt the énd of this transactión, the Client wiIl have the éncryption key thé APs signature só that its réady to be connécted to the éncrypted network.Īfter this is complete, the AP disassociates with the client.
