Pixiewps is a tool written in C used to bruteforce offline the WPS PIN exploiting the low or non-existing entropy of some software implementations, the so-called "pixie-dust attack" discovered by Dominique Bongard in summer 2014. It is meant for educational purposes only.
As opposed to the traditional online brute-force attack, implemented in tools like Reaver or Bully which aim to recover the pin in a few hours, this method can get the PIN in only a matter of seconds or minutes, depending on the target, if vulnerable.
Since version 1.4, it can also recover the WPA-PSK from a complete passive capture (M1 through M7) for some devices (currently only some devices which work with
It all started as a project from the community, more details can be found here:
You can also visit the wiki.
apt-get -y install build-essential
- Prior versions of 1.2 require libssl-dev
- Versions 1.4 and later make use of multi-threading and require libpthread (POSIX threads)
OpenSSL has also been re-introduced as optional to achieve better speeds. See the Build section.
git clone https://github.com/wiire/pixiewps
wget https://github.com/wiire/pixiewps/archive/master.zip && unzip master.zip
cd pixiewps*/ make
Optionally, you can run
make OPENSSL=1 to use faster OpenSSL SHA-256 functions.
sudo make install
Usage: pixiewps <arguments> Required arguments: -e, --pke : Enrollee public key -r, --pkr : Registrar public key -s, --e-hash1 : Enrollee hash 1 -z, --e-hash2 : Enrollee hash 2 -a, --authkey : Authentication session key -n, --e-nonce : Enrollee nonce Optional arguments: -m, --r-nonce : Registrar nonce -b, --e-bssid : Enrollee BSSID -v, --verbosity : Verbosity level 1-3, 1 is quietest  -o, --output : Write output to file -j, --jobs : Number of parallel threads to use [Auto] -h : Display this usage screen --help : Verbose help and more usage examples -V, --version : Display version --mode N[,... N] : Mode selection, comma separated [Auto] --start [mm/]yyyy : Starting date (only mode 3) [+1 day] --end [mm/]yyyy : Ending date (only mode 3) [-1 day] -f, --force : Bruteforce full range (only mode 3) Miscellaneous arguments: -7, --m7-enc : Recover encrypted settings from M7 (only mode 3) -5, --m5-enc : Recover secret nonce from M5 (only mode 3)
The most common usage example is:
pixiewps --pke ... --pkr ... --e-hash1 ... --e-hash2 ... --authkey ... --e-nonce ...
which requires a modified version of Reaver or Bully which prints the Authentication Session key (
-a). The recommended version is reaver-wps-fork-t6x.
The program has also a man page and a verbose help screen (
--help) with more examples.
This feature was introduced back in Reaver 1.3. It works by choosing the private key = 1, thus resulting in having the public key
--pkr = 2. This speeds up the cracking process since the AP must do less computations to calculate the Diffie-Hellman shared secret, which is later used to derive the session keys that encrypt the current transaction. Pixiewps can exploit this feature so that the user doesn't have to input
--pkr (it's always 2) and optionally compute the session keys, like
--authkey, if additional arguments,
--bssid, are specified.
It turns out some routers are buggy and do not function correctly with this feature. Some won't even be able to validate the correct PIN and the transaction will fail after M4. For this reason this feature is deprecated and should never be used in Reaver.
This option requires the attribute encrypted settings found in M7 when the Registrar proved knowledge of the PIN, and the Access Points, the Enrollee, sends its current network configuration.
This feature can be used to crack the WPA-PSK (and WPS PIN) from a passive packet capture (e.g. sniffing a PBC session).
This option is used only for mode 3. When used pixiewps will start bruteforcing from the current time and go back all the way to 0. It is conceptually identical to using
--end 01/1970 only (or
--start 01/1970 since they're interchangeable).
The empty PIN, denoted with
<empty> can be tested with
-p "" in Reaver 1.6.1 and later. It comes from a misconfiguration of the PIN method on some Access Points which have the PIN variable set to
NULL (or empty string).
Pixiewps can be compiled for a wide variety of platforms. On Windows it can be compiled with MinGW. Be sure to have installed phtread support.
The version numbering is in the form
x usually indicates a major release, and
y a minor release, typically bug fixing or other small changes. Every major release starts with
y = 0 and should be considered unstable in the first hours of publishing, even if not marked as such.
For a list of changes between one release and the previous refer to CHANGELOG.
Notes for wrappers and scripts
- The data in input can be formatted with one of the following byte separators: '
- The most useful tags like
WPA-PSKare denoted with
[-]in case of failure
- Pixiewps returns
0on a successful attempt
- An option that has been deprecated means that it shouldn't be used anymore and may get removed on a later release
Since the very first release pixiewps has improved a lot, but it's hard to keep track of every device on the market. We have decided to add an automatic message suggesting that we are interested in the parameters of the device tested by the user.
- Part of the code was inspired by Bully by Brian Purcell
- The crypto and bignum libraries were taken from LibTomCrypt and TomsFastMath
- Endianness detection and conversion is from rofl0r/endianness.h
- See contributors for a list of everyone that has contributed
- Huge thanks to
binarymasterfor helping and testing
- Special thanks to
aanarchyyand the Kali Linux community
Pixiewps is based on the work of Dominique Bongard (@Reversity):