musketteams Posted November 19, 2014 Posted November 19, 2014 If you are following WPS exploits you will know there is a new attack called Pixie Dust which was accidently discovered. The coding for this attack has not been published. HOWEVER As MTeams have also seen WPS/WPA info provided unexpectedly, and to impliment this attack only a few lines of reaver coding needs to be changed, you might try ryreaver-reaver. Stands for reverse reaver. It runs in kali-linux. Unfortunately it doesnot save its work so if you stop the process it starts all over. We downloaded the rar file, converted it and ran from root ./ryreaver-reverse. We will do some tests to write the output to text and screen thru tee and Eterm windows and post here when finished The direct download is: http://sethioz.com/forum/download/file.php?id=1450&sid=908e86c38c50c62ab3034b82f22693d5 Commentaryhttp://sethioz.com/forum/viewtopic.php?p=9757 Those interested in Pixie dust seach kali-linux forums - links to this topic can be found there. Quote
Mr-Protocol Posted November 19, 2014 Posted November 19, 2014 Not really a lot of documentation on this spread across the forums (kali posts you made, and stuff on the sethioz site). Quote
cooper Posted November 19, 2014 Posted November 19, 2014 To quote the article on the subject on ArsTechnica: [The] attack exploits the lack of randomization in the nonce, a number used to create the pseudo-random inputs to calculate the [WPA] keys. Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.