mdk4 vs Pixiewps
GitHub Stats
About mdk4
mdk4 is a Wi-Fi testing tool that exploits common IEEE 802.11 protocol weaknesses. It is the successor to mdk3, rewritten to work with the modern cfg80211 wireless subsystem in Linux. mdk4 provides a suite of attacks for wireless penetration testing including beacon flooding (creating thousands of fake access points), authentication/deauthentication flooding, SSID brute forcing, 802.11s mesh network exploitation, and WDS confusion attacks. It can probe access points for connected clients, test for MAC filtering bypass, and stress-test wireless infrastructure under various attack conditions. mdk4 is primarily used to test the resilience of wireless networks and intrusion detection systems against denial of service and protocol-level attacks. It requires a wireless adapter in monitor mode.
About Pixiewps
Pixiewps is a tool used to brute force offline the WPS PIN exploiting the low or non-existing entropy of some software implementations. This is known as the Pixie Dust attack, which exploits weak random number generation in the WPS protocol implementation of many routers. While Reaver performs online brute force (trying PINs against the router one by one), Pixiewps works offline - it captures the WPS exchange data and computes the PIN locally, typically recovering it in seconds rather than hours. The attack works because many router manufacturers use predictable values (like the router's own BSSID or timestamp) to seed the random number generator used in the WPS Diffie-Hellman key exchange. Pixiewps is typically used in conjunction with Reaver or Bully, which handle the network interaction while Pixiewps performs the offline computation.
Platform Support
Tags
mdk4 only
Pixiewps only