From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Using Pixiedust to recover keys

Using Pixiedust to recover keys - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Start my 1-month free trial

Using Pixiedust to recover keys

- While the WPS brute force attack has largely been defeated by rate-limiting, we can use a tool called Pixie-Dust, to attempt offline extraction of the pin after recovering just one handshake from the WPS negotiation. This is possible where the implementation of WPS has used a low-quality random number generator. And this includes a range of current router and extender models from Asus, Belkin, Linksys, Netgear, TP-Link and Zexal. In some cases, the nonces used to generate the pin are set to 0, a very poor implementation decision. We don't need to use the Pixie-Dust tool itself, because the Pixie-Dust attack has been integrated into Reaver. We can invoke this by using the -K option. I've got a current model Linksys N300 range extender, which I'll use for this test. To run the test, I first need to set the external antenna into monitoring mode. I then need to get the BSSID of the access point, so I'll run wash again.…

Contents