Skip to content

Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant

Notifications You must be signed in to change notification settings

nikita-yfh/OneShot-C

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Overview

OneShot-C - implementation of OneShot on C

OneShot-С performs Pixie Dust attack without having to switch to monitor mode.

Features

Requirements

Compile

make

Usage examples

Start Pixie Dust attack on a specified BSSID:

sudo ./oneshot -i wlan0 -b 00:90:4C:C1:AC:21 -K

Show avaliable networks and start Pixie Dust attack on a specified network:

sudo ./oneshot -i wlan0 -K

Launch online WPS bruteforce with the specified first half of the PIN:

sudo ./oneshot -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234

Troubleshooting

"RTNETLINK answers: Operation not possible due to RF-kill"

Just run: sudo rfkill unblock wifi

"Device or resource busy (-16)"

Try disabling Wi-Fi in the system settings and kill the Network manager. Alternatively, you can try running OneShot with --iface-down argument.

Acknowledgements

Special Thanks

  • rofl0r for initial implementation;
  • Monohrom for testing, help in catching bugs, some ideas;
  • Wiire for developing Pixiewps.