All Projects → drygdryg → OneShot

drygdryg / OneShot

Licence: other
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to OneShot

wifite2-requirements
This bash script will install wifite2 and its other tools Pyrit, bully, wireshark, hcxtools, hcxdumptool, macchanger
Stars: ✭ 20 (-91.03%)
Mutual labels:  hacking-tool, wifi-security, wifi-hacking
Boopsuite
A Suite of Tools written in Python for wireless auditing and security testing.
Stars: ✭ 807 (+261.88%)
Mutual labels:  hacking-tool, wifi-security
Wifi-Cracker
Wifi Cracking
Stars: ✭ 128 (-42.6%)
Mutual labels:  wifi-security, wifi-hacking
Pixiewps
An offline Wi-Fi Protected Setup brute-force utility
Stars: ✭ 1,149 (+415.25%)
Mutual labels:  hacking-tool, wifi-security
owt
Update Version 3.1 added free SMS messaging.
Stars: ✭ 339 (+52.02%)
Mutual labels:  wifi-hacking, wifi-hacking-script
wifivoid
Ruby script for continuously jam all wifi clients and access points within range
Stars: ✭ 91 (-59.19%)
Mutual labels:  wifi-security, wifi-hacking
Project Tauro
A Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-76.68%)
Mutual labels:  hacking-tool, wifi-security
Wifi Passview
An open source batch script based WiFi Passview for Windows!
Stars: ✭ 157 (-29.6%)
Mutual labels:  hacking-tool, wifi-security
Airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+1617.49%)
Mutual labels:  wps, pixie-dust
Lscript
The LAZY script will make your life easier, and of course faster.
Stars: ✭ 3,056 (+1270.4%)
Mutual labels:  wpa-cracker, pixie-dust
refluxion
Refluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-88.79%)
Mutual labels:  hacking-tool, wifi-hacking
wifi-pentesting-guide
WiFi Penetration Testing Guide
Stars: ✭ 105 (-52.91%)
Mutual labels:  wifi-security, wifi-hacking
anubis
Captive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-79.37%)
Mutual labels:  hacking-tool, wifi-security
VirusX5
The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-93.27%)
Mutual labels:  hacking-tool
KeyLy
A powerfull and awesome Keylogger(Your keyboard and your mouse) realy helpfull for hackers! :-P (C/C++)
Stars: ✭ 17 (-92.38%)
Mutual labels:  hacking-tool
awesome-pentest-tools
List of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-84.75%)
Mutual labels:  hacking-tool
ObsidianSailboat
Nmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-83.86%)
Mutual labels:  hacking-tool
WPS
The 52°North Web Processing Service enables the deployment of geo-processes on the web in a standardized way.
Stars: ✭ 57 (-74.44%)
Mutual labels:  wps
evildork
Evildork targeting your fiancee👁️
Stars: ✭ 46 (-79.37%)
Mutual labels:  hacking-tool
fluxion
WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)
Stars: ✭ 115 (-48.43%)
Mutual labels:  hacking-tool

Overview

OneShot performs Pixie Dust attack without having to switch to monitor mode.

Features

Requirements

Setup

Debian/Ubuntu

Installing requirements

sudo apt install -y python3 wpasupplicant iw wget

Installing Pixiewps

Ubuntu 18.04 and above or Debian 10 and above

sudo apt install -y pixiewps

Other versions

sudo apt install -y build-essential unzip
wget https://github.com/wiire-a/pixiewps/archive/master.zip && unzip master.zip
cd pixiewps*/
make
sudo make install

Getting OneShot

cd ~
wget https://raw.githubusercontent.com/drygdryg/OneShot/master/oneshot.py

Optional: getting a list of vulnerable to pixie dust devices for highlighting in scan results:

wget https://raw.githubusercontent.com/drygdryg/OneShot/master/vulnwsc.txt

Arch Linux

Installing requirements

sudo pacman -S wpa_supplicant pixiewps wget python

Getting OneShot

wget https://raw.githubusercontent.com/drygdryg/OneShot/master/oneshot.py

Optional: getting a list of vulnerable to pixie dust devices for highlighting in scan results:

wget https://raw.githubusercontent.com/drygdryg/OneShot/master/vulnwsc.txt

Alpine Linux

It can also be used to run on Android devices using Linux Deploy

Installing requirements
Adding the testing repository:

sudo sh -c 'echo "http://dl-cdn.alpinelinux.org/alpine/edge/testing/" >> /etc/apk/repositories'
sudo apk add python3 wpa_supplicant pixiewps iw

Getting OneShot

sudo wget https://raw.githubusercontent.com/drygdryg/OneShot/master/oneshot.py

Optional: getting a list of vulnerable to pixie dust devices for highlighting in scan results:

sudo wget https://raw.githubusercontent.com/drygdryg/OneShot/master/vulnwsc.txt

Termux

Please note that root access is required.

Using installer

curl -sSf https://raw.githubusercontent.com/drygdryg/OneShot_Termux_installer/master/installer.sh | bash

Manually

Installing requirements

pkg install -y root-repo
pkg install -y git tsu python wpa-supplicant pixiewps iw

Getting OneShot

git clone --depth 1 https://github.com/drygdryg/OneShot OneShot

Running

sudo python OneShot/oneshot.py -i wlan0 --iface-down -K

Usage

 oneshot.py <arguments>
 Required arguments:
     -i, --interface=<wlan0>  : Name of the interface to use

 Optional arguments:
     -b, --bssid=<mac>        : BSSID of the target AP
     -p, --pin=<wps pin>      : Use the specified pin (arbitrary string or 4/8 digit pin)
     -K, --pixie-dust         : Run Pixie Dust attack
     -B, --bruteforce         : Run online bruteforce attack
     --push-button-connect    : Run WPS push button connection

 Advanced arguments:
     -d, --delay=<n>          : Set the delay between pin attempts [0]
     -w, --write              : Write AP credentials to the file on success
     -F, --pixie-force        : Run Pixiewps with --force option (bruteforce full range)
     -X, --show-pixie-cmd     : Alway print Pixiewps command
     --vuln-list=<filename>   : Use custom file with vulnerable devices list ['vulnwsc.txt']
     --iface-down             : Down network interface when the work is finished
     -l, --loop               : Run in a loop
     -v, --verbose            : Verbose output

Usage examples

Start Pixie Dust attack on a specified BSSID:

sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -K

Show avaliable networks and start Pixie Dust attack on a specified network:

sudo python3 oneshot.py -i wlan0 -K

Launch online WPS bruteforce with the specified first half of the PIN:

sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234

Start WPS push button connection:s

sudo python3 oneshot.py -i wlan0 --pbc

Troubleshooting

"RTNETLINK answers: Operation not possible due to RF-kill"

Just run: sudo rfkill unblock wifi

"Device or resource busy (-16)"

Try disabling Wi-Fi in the system settings and kill the Network manager. Alternatively, you can try running OneShot with --iface-down argument.

Acknowledgements

Special Thanks

  • rofl0r for initial implementation;
  • Monohrom for testing, help in catching bugs, some ideas;
  • Wiire for developing Pixiewps.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].