From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 24,600 courses taught by industry experts.

Using Pixiedust to recover keys

Using Pixiedust to recover keys - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Using Pixiedust to recover keys

- While the WPS brute force attack has largely been defeated by rate-limiting, we can use a tool called Pixie-Dust, to attempt offline extraction of the pin after recovering just one handshake from the WPS negotiation. This is possible where the implementation of WPS has used a low-quality random number generator. And this includes a range of current router and extender models from Asus, Belkin, Linksys, Netgear, TP-Link and Zexal. In some cases, the nonces used to generate the pin are set to 0, a very poor implementation decision. We don't need to use the Pixie-Dust tool itself, because the Pixie-Dust attack has been integrated into Reaver. We can invoke this by using the -K option. I've got a current model Linksys N300 range extender, which I'll use for this test. To run the test, I first need to set the external antenna into monitoring mode. I then need to get the BSSID of the access point, so I'll run wash again.…

Contents