From the course: Ethical Hacking: Wireless Networks
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Using Pixiedust to recover keys - Linux Tutorial
From the course: Ethical Hacking: Wireless Networks
Using Pixiedust to recover keys
- While the WPS brute force attack has largely been defeated by rate-limiting, we can use a tool called Pixie-Dust, to attempt offline extraction of the pin after recovering just one handshake from the WPS negotiation. This is possible where the implementation of WPS has used a low-quality random number generator. And this includes a range of current router and extender models from Asus, Belkin, Linksys, Netgear, TP-Link and Zexal. In some cases, the nonces used to generate the pin are set to 0, a very poor implementation decision. We don't need to use the Pixie-Dust tool itself, because the Pixie-Dust attack has been integrated into Reaver. We can invoke this by using the -K option. I've got a current model Linksys N300 range extender, which I'll use for this test. To run the test, I first need to set the external antenna into monitoring mode. I then need to get the BSSID of the access point, so I'll run wash again.…
Contents
-
-
-
Understanding wireless networks5m 52s
-
(Locked)
Selecting an antenna for wireless network testing5m 16s
-
(Locked)
Configuring security in wireless networks3m 26s
-
(Locked)
Understanding the Wi-Fi Protected Setup (WPS)5m 20s
-
(Locked)
Extracting WEP passwords using Wifite2m 9s
-
(Locked)
Extracting network passwords through WPS2m 35s
-
(Locked)
Using WiFite and Aircrack-ng to test WPA passwords2m
-
(Locked)
Using Pixiedust to recover keys2m 44s
-
(Locked)
A first look at WPA32m 26s
-
(Locked)
Understanding Dragonblood2m 37s
-
-
-
-
-
-