WPS Vulnerabilities¶
WPS‑PIN (not PBC) is required for these attacks.
Check if WPS is enabled on the target AP before proceeding.
wash
comes from the tool Reaver
Online PIN bruteforce¶
Bruteforce PIN authentications online. Limited by throttling / authentication lockout.
"Pixie Dust" - Offline PIN recovery¶
Capture WPS M1/M2/M3 exchange packets and quickly crack offline due to AP with predictable PIN generation algorithms.
Exploitation¶
See if WPS-PIN is being offered and unlocked.
wash
comes from the tool Reaver
Attempt a Pixie test. If successful, the target's PIN will be recovered.
Use the recovered PIN to retrieve the PSK.
Weak/default PIN algorithms¶
Online password guessing. Some APs have algorithms that generate predictable PINs. Generate one and try to use it.
Does not work if the PIN has been changed from its default.
Identify AP model info to determine if it is a model with a known weak PIN algorithm.
Check the Wireless Security Database to see if the AP is known to be vulnerable.
wash
comes from the tool Reaver