anode Posted September 20, 2016 Share Posted September 20, 2016 Title kinda says it all, but can you run the PixieDust attack against a pcap/4-way hasndshake file? Or is it strictly WPS based? Quote Link to comment Share on other sites More sharing options...
Sebkinne Posted September 20, 2016 Share Posted September 20, 2016 WPS only. Quote Link to comment Share on other sites More sharing options...
digip Posted September 21, 2016 Share Posted September 21, 2016 however, if you already have the 4way handshake, dump it to aircrack-ng, or convert its output and throw it at hashcat which can also break it with wordlist, or brute force on the fly(using GPU) Quote Link to comment Share on other sites More sharing options...
anode Posted September 21, 2016 Author Share Posted September 21, 2016 Hashcat is my goto. But pixie is milliseconds, if its vulnerable. (gonna poke around a bit, saw something that might lead somewhere. I tossed the Q out there as to not reinvent the wheel if there was something already out there.) Quote Link to comment Share on other sites More sharing options...
0phoi5 Posted September 26, 2016 Share Posted September 26, 2016 WPA/2 = Aircrack-ng and oclHashcat FTW. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.