Author Topic: Using pixiewps on vulnerable chipset routers  (Read 26590 times)

0 Members and 4 Guests are viewing this topic.

Offline ptales

  • Peasant
  • *
  • Posts: 75
  • Cookies: 10
  • Perfected Imperfection
    • View Profile
Re: Using pixiewps on vulnerable chipset routers
« Reply #30 on: July 28, 2015, 12:29:33 pm »
Sorry for my late reply, was busy the last days.
My Alfa arrived and all problems I had are solved, just didn't find a vulnerable chipset router yet. Thanks for all the helpful answers I received! I've now started reading some eBooks regarding wireless penetration testing.
'Until they become conscious they will never rebel, and until after they have rebelled they cannot become conscious.'

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: Using pixiewps on vulnerable chipset routers
« Reply #31 on: July 28, 2015, 05:08:20 pm »
Sorry for my late reply, was busy the last days.
My Alfa arrived and all problems I had are solved, just didn't find a vulnerable chipset router yet. Thanks for all the helpful answers I received! I've now started reading some eBooks regarding wireless penetration testing.

Read through my updated tutorial:
https://evilzone.org/tutorials/wireless-auditing-with-kali-linux-aircrack-ng-reaver-and-pixiewps

That method works on more models.. This one is pretty much for Ralink and a few broadcomm chipset routers. The -S argument limits the amount of vulnerable routers. It's just much quicker bruteforcing vulnerable routers
« Last Edit: July 28, 2015, 05:09:31 pm by DeepCopy »
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry

Offline ptales

  • Peasant
  • *
  • Posts: 75
  • Cookies: 10
  • Perfected Imperfection
    • View Profile
Re: Using pixiewps on vulnerable chipset routers
« Reply #32 on: July 28, 2015, 10:31:03 pm »
Thanks for the link, will definitely read through that tutorial! You're really being a great help! :)
'Until they become conscious they will never rebel, and until after they have rebelled they cannot become conscious.'

Offline tommymaymay

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: Using pixiewps on vulnerable chipset routers
« Reply #33 on: September 17, 2015, 12:05:12 pm »
I managed to get it done, and im sharing the AP i tried it on:

[P] WPS Manufacturer: Sitecom Europe BV
[P] WPS Model Name: Wireless Access Point 300N
[P] WPS Model Number: Wireless Access Point 300N


Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: Using pixiewps on vulnerable chipset routers
« Reply #34 on: September 17, 2015, 12:44:26 pm »
I managed to get it done, and im sharing the AP i tried it on:

[P] WPS Manufacturer: Sitecom Europe BV
[P] WPS Model Name: Wireless Access Point 300N
[P] WPS Model Number: Wireless Access Point 300N
Would help if you post the first xx:xx:xx:xx of the BSSID.
Also thanks for sharing with us.
« Last Edit: September 17, 2015, 12:44:45 pm by proxx »
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline tommymaymay

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: Using pixiewps on vulnerable chipset routers
« Reply #35 on: September 17, 2015, 12:47:46 pm »
Would help if you post the first xx:xx:xx:xx of the BSSID.
Also thanks for sharing with us.

[P] WPS Manufacturer: Sitecom Europe BV
[P] WPS Model Name: Wireless Access Point 300N
[P] WPS Model Number: Wireless Access Point 300N
BSSID: 00:0C:F6:87

There you go ;)