Wireless Attackswifiwpawpa2wpsdefault-keysauditing

PSKracker

PSKracker is a collection of WPA/WPA2/WPS default keys generators/piners for testing and auditing wireless networks. It includes bleeding edge algorithms written in C.

Description

PSKracker provides a toolkit for generating default passwords and pins for WPA/WPA2/WPS enabled wireless networks. This is particularly useful for security auditors and penetration testers who need to test networks using known default credentials from various router manufacturers.

The tool relies on a data package containing dictionaries of algorithms and patterns specific to different device models. It supports input of target model numbers, BSSIDs, and serial numbers to produce potential keys or pins.

Use cases include auditing enterprise or home wireless networks for weak default configurations, educational purposes in WiFi security training, and identifying vulnerabilities in router firmware that ship with predictable credentials.

How It Works

PSKracker uses pre-compiled algorithms stored in the pskracker-data package's dicts directory to generate default WPA/WPA2 keys and WPS pins based on target model numbers, BSSIDs, and serial numbers. The C-based generators apply manufacturer-specific patterns and bleeding edge techniques to produce possible credentials for wireless security auditing.

Installation

bash
sudo apt install pskracker

Flags

-t, --targetTarget model number
-b, --bssidBSSID of target
-W, --wpsOutput possible WPS pin(s) only
-G, --guestOutput possible guest WPA key(s) only
-s, --serialSerial number
-f, --forceForce full output
-h, --helpDisplay help/usage

Examples

Display help and usage information
pskracker -h
Generate keys/pins for specified target model number
pskracker -t <target model>
Generate keys/pins for target model with specified BSSID
pskracker -t <target model> -b <bssid>
Generate keys/pins for target model with specified serial number
pskracker -t <target model> -s <serial number>
Full example: generate keys/pins using model, BSSID, and serial
pskracker -t <target model> -b <bssid> -s <serial number>
Output possible WPS pins only for target model
pskracker -t <target model> -W
Output possible guest WPA keys only for target model
pskracker -t <target model> -G
Force full output for target model
pskracker -t <target model> -f
Updated 2026-04-16kali.org ↗