Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack using Airgeddon [Tutorial]
Null Byte Null Byte
938K subscribers
649,969 views
11K

 Published On Mar 17, 2018

Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop

How to Break WPS PINs Using Airgeddon & Bully
Full Tutorial: https://nulb.app/x49tg
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody's Twitter:   / kodykinzie  

Cyber Weapons Lab, Episode 008

If you're squaring up against a WPA or WPA2 network with a strong password, you may feel like you're at the end of your options if you can't brute-force or social engineer the password. Fortunately, many routers have a flaw in the WPS setup pin feature that makes bypassing any WPA-based security trivial.

Using a tool called Bully, we can exploit weak entropy in the keys many routers use to encrypt the WPS pin, allowing us to break the WPS setup pin in vulnerable routers to dump the Wi-Fi password. We will use the WPS Pixie-Dust attack option in the Airgeddon wireless attack framework, as it gives us the most flexibility in selecting and attacking targets.

Tool: https://github.com/v1s1t0r1sh3r3/airg...

Guide to picking a network adapter: https://nulb.app/x45qf

To learn more, check out the article: https://nulb.app/x49tg

Follow Null Byte on:
Twitter:   / nullbyte  
Flipboard: https://flip.it/3.Gf_0
Website: https://null-byte.com
Vimeo: https://vimeo.com/channels/nullbyte

show more

Share/Embed