EN
ENNA

Aircrack-ng vs Pixiewps

GitHub Stats

7.1k
Stars
1.7k
1.3k
Forks
320
449
Issues
11
8mo ago
Updated
2y ago
GPL-2.0
License
-
C
Language
C

About Aircrack-ng

Aircrack-ng is a complete suite of tools for assessing WiFi network security. It focuses on monitoring (packet capture and export of data to text files), attacking (replay attacks, deauthentication, fake access points), testing (checking WiFi cards and driver capabilities), and cracking (WEP and WPA PSK). All tools are command-line based, allowing heavy scripting and automation. It works primarily with Linux but also supports Windows, macOS, FreeBSD, and others.

About Pixiewps

Pixiewps is a tool used to brute force offline the WPS PIN exploiting the low or non-existing entropy of some software implementations. This is known as the Pixie Dust attack, which exploits weak random number generation in the WPS protocol implementation of many routers. While Reaver performs online brute force (trying PINs against the router one by one), Pixiewps works offline - it captures the WPS exchange data and computes the PIN locally, typically recovering it in seconds rather than hours. The attack works because many router manufacturers use predictable values (like the router's own BSSID or timestamp) to seed the random number generator used in the WPS Diffie-Hellman key exchange. Pixiewps is typically used in conjunction with Reaver or Bully, which handle the network interaction while Pixiewps performs the offline computation.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux

Tags

Shared

wifi

Aircrack-ng only

wpapacket-captureclassic

Pixiewps only

wpspixie-dustoffline-attackbrute-force