EvilZone

Hacking and Security => Hacking and Security => Topic started by: FurqanHanif on March 19, 2015, 02:03:09 PM

Title: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: FurqanHanif on March 19, 2015, 02:03:09 PM
Any one hears about this Pixie Dust attack/exploit?? is their any tool available yet to do this attack ?? if not then any one knows how to do it, i think it has Something to do with M3 , Es1 , ES 2 , hash Decrypt and then Brute force the WPS pin. So how to Decrypt and Brute Force Pin Exactly ..??  :o (Please Post if Someone Knows anyThing (Tool etc) Regarding this Attack.. :)

http://www.slideshare.net/0xcite/offline-bruteforce-attack-on-wifi-protected-setup
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: proxx on March 19, 2015, 02:15:04 PM
Intertesting, keep us posted. ty
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: FurqanHanif on March 19, 2015, 08:48:36 PM
Well it Looks Like Pixie Dust attack Really exists...
An person posted POC(proof of concept) on kali forum in Which he Successfully Recovered the correct WPS PIN via Offline Brute Forcing PIN .........
(For more info Visit)
https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-(Offline-WPS-Attack)/page4&highlight=pixie+dust+attack
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: nrael on March 19, 2015, 09:51:29 PM
as far as I know there's the cool called "reaver"

I did try but it never worked.

or is this pixie attack something else / new?
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: proxx on March 20, 2015, 08:11:40 AM
as far as I know there's the cool called "reaver"

I did try but it never worked.

or is this pixie attack something else / new?
Yes that was back in the days before most of the devices got patched.
And yes it did work, must have been over 4 years ago now.

We have a NOWPS policy for any device that even remotely thinks about wireless.
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: Relapse on March 25, 2015, 09:47:09 AM
reaver is a very active attack, not an offline BF attack. Do some research before asking dumb questions, you didn't really think these other guys have never heard of reaver did you?


https://passwordscon.org/wp-content/uploads/2014/08/Dominique_Bongard.pdf


This is very interesting actually. Reading through the .PDF, never thought of triggering the breakers but it's almost 80% always accessible physically.
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: v32itas on March 28, 2015, 03:57:12 AM
This could be nice. To advanced for me, but  i miss those days when reaver was effective. Dictionary attacks sux.
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: techb on March 28, 2015, 04:07:42 AM
Most routers I have come across requires you to physically hit a button or an option in the firmware before activating WPS, and even then its temporary. The only devices I can think of that might have WPS active by default would be like printers or something.
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: FurqanHanif on April 03, 2015, 01:02:32 PM
Pixie WPS attack Tool Is out ...  ;D Must Check ...
https://github.com/wiire/pixiewps
https://forums.kali.org/showthread.php?25018-Pixiewps-wps-pixie-dust-attack-tool
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: v32itas on April 03, 2015, 01:31:59 PM
Pixie WPS attack Tool Is out ...  ;D Must Check ...
https://github.com/wiire/pixiewps
https://forums.kali.org/showthread.php?25018-Pixiewps-wps-pixie-dust-attack-tool

shiet gonna boot kali and go outside at last.
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: deviant_sheep on April 04, 2015, 06:45:13 PM
Oh shit.. this is good stuff.. I read about this a few months ago but this tool wasnt available afaik.. Im giving this a try like.. now.  Will post back with results.
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: nrael on April 04, 2015, 08:27:35 PM
I tried hours to get it work. I've run the updated reaver version and got the PKE and the auth key but reaver sucks up after the sending M2 message, so I don't get the E-HASH1 and 2.

Made someone the same experience or did it work?
Title: Re: New Pixie Dust Attack/Exploit (WPS Enabled Routers)
Post by: iTpHo3NiX on April 07, 2015, 04:54:46 AM
I tried hours to get it work. I've run the updated reaver version and got the PKE and the auth key but reaver sucks up after the sending M2 message, so I don't get the E-HASH1 and 2.

Made someone the same experience or did it work?

I was having the same issues in a live hack, you need to be closer to the AP

My dumbass tried it on a realtek thinking it was a ralink lmfao wondering wtf, why didn't it work hahaha

On vulnerable routers, this really works a treat! You're talking WPS Pins in a matter of minutes. Beats the hell out of WEP attacks!