Latest Change : All Change.
Pyxiewps is a wireless attack tool writen in python that uses reaver, pixiewps, macchanger and aircrack to retrieve the WPS pin of any vulnerable AP in seconds. It is meant for educational purposes only.
It enumerates all the APs with active WPS, tries to get the PKE, PKR, E-NONCE, R-NONCE, AUTHKEY, HASH1 and 2 using the patched version of reaver, then passes all that information to pixiewps program so that it can retrieve the WPS pin, and finally runs reaver again with the pin that pixiewps found to get the AP WPA password.
git clone https://github.com/jgilhutton/pyxiewps
python pyxiewps-ES.py | pyxiewps-EN.py
python pyxiewps-[LANGUAGE].py <arguments>
-r --use-reaver Use reaver to get all the AP information. [False]
-p --use-pixie Once all the data is captured with reaver [False]
the script tries to get the WPS pin with pixiewps.
-w --wash-time [time] Set the time used to enumerate all the WPS-active APs. 
-t --time [time] Set the time used to get the hex data from the AP. 
-c --channel [channel] Set the listening channel to enumerate the WPS-active APs.
If not set, all channels are listened.
-P --prompt If more than one WPS-active AP is found, ask the user [False]
the target to attack.
-o --output [file] Outputs all the data into a file.
-f --pass If the WPS pin is found, the script uses reaver again to retrieve
the WPA password of the AP.
-q --quiet Doesn't print the AP information. Will print the WPS pin and pass if found.
-F --forever Runs the program on a While loop so the user can scan and attack a hole
zone without having to execute the program over and over again.
-O --override Doesn't prompt the user if the WPS pin of the current AP has already
been found. DOESN'T SKIP THE AP, the script attacks it again.