-
Notifications
You must be signed in to change notification settings - Fork 404
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
wash --pbc ? #351
Comments
It is possible and pixiewps supports it for old Realtek chips that used a static diffie-hellman key. I think arg -7 is what you need. You can get a passive capture with airodump and grab the parameters from the capture. |
Outside of seeing it in your captures, there’s no tool that will tell you if it sees PBC activated. |
Oh ,Thanks a lot for your reply mate But what are parameters to look for ? and would that method be fast enough To be able to get to start a connection when the parameters are detected as i mean WPS PBC has |
It doesn't really matter because you can decrypt all messages. So you can get the PIN and the PSK. Check the README for a quick example. |
@soxrok2212 I checked it but i can't still get how to use the I have to collect the first ? then use them in addition to arg -7 ? Thanks i still want to know search filter for airodump to know if it's pressed or not also are you available for chatting ? as i want to add this to a more advance attack ... A phishing type |
I tried it use -7 arg So , How do i actually use it ? |
ftr this discussion moved to wiire-a/pixiewps#107 |
I am looking for a way to if a network has its wps button pushed
without trying to connect to it but with just monitoring it
is that possible ?
It would be a really cool addition to WASH if it can tell the networks whom buttons was pushed
and print it in scan with timeout or something
Any way to do this would be great
As i am trying mix it with Phishing , instead of the password.
Thanks
The text was updated successfully, but these errors were encountered: