Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
WPS Brute Force Attack Using Bully | Kali Linux 2017.1
#1

Published on May 9, 2017
Bully is a new implementation of the WPS brute force attack, written in C. It is conceptually identical to other programs, in that it exploits the (now well known) design flaw in the WPS specification. It has several advantages over the original reaver code. These include fewer dependencies, improved memory and cpu performance, correct handling of endianness, and a more robust set of options. It runs on Linux, and was specifically developed to run on embedded Linux systems (OpenWrt, etc) regardless of architecture.

Bully provides several improvements in the detection and handling of anomalous scenarios. It has been tested against access points from numerous vendors, and with differing configurations, with much success.

Download: https://github.com/aanarchyy/bully

You must already have Wiire's Pixiewps installed. The latest version can be found here: https://github.com/wiire/pixiewps.

Install: apt-get -y install build-essential libpcap-dev libssl1.0-dev aircrack-ng pixiewps

Facebook Page: https://www.facebook.com/kaliforensics

Thanks For Watching....

Like Share & Subscribe.....
  • Category
  • License
    • Standard YouTube License
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Setoolkit - Hack over WAN Kali Linux 2017.1 | How To Access localhost Over Internet 2 baziroll 0 2,766 08-15-2017 , 12:45 AM
Last Post: baziroll
  Egg Shell | IOS & MAC OS Remote Administration Tool | Kali Linux 2017.1 baziroll 0 2,668 08-15-2017 , 12:44 AM
Last Post: baziroll
  BoopSuite | Wireless Auditing and Security Testing | Kali Linux 2017.1 baziroll 0 2,575 08-14-2017 , 12:54 AM
Last Post: baziroll
  Inforfinder | Information Gathering | Kali Linux 2017.1 baziroll 0 2,204 08-06-2017 , 12:40 AM
Last Post: baziroll
  Eternal Scanner | Ransomware Free | Kali Linux 2017.1 baziroll 0 1,992 08-05-2017 , 12:46 AM
Last Post: baziroll

Forum Jump:


Users browsing this thread: 1 Guest(s)