PSKracker
PSKracker is a collection of WPA/WPA2/WPS default keys generators/piners for testing and auditing wireless networks. It includes bleeding edge algorithms written in C.
Description
PSKracker provides a toolkit for generating default passwords and pins for WPA/WPA2/WPS enabled wireless networks. This is particularly useful for security auditors and penetration testers who need to test networks using known default credentials from various router manufacturers.
The tool relies on a data package containing dictionaries of algorithms and patterns specific to different device models. It supports input of target model numbers, BSSIDs, and serial numbers to produce potential keys or pins.
Use cases include auditing enterprise or home wireless networks for weak default configurations, educational purposes in WiFi security training, and identifying vulnerabilities in router firmware that ship with predictable credentials.
How It Works
PSKracker uses pre-compiled algorithms stored in the pskracker-data package's dicts directory to generate default WPA/WPA2 keys and WPS pins based on target model numbers, BSSIDs, and serial numbers. The C-based generators apply manufacturer-specific patterns and bleeding edge techniques to produce possible credentials for wireless security auditing.
Installation
sudo apt install pskrackerFlags
Examples
pskracker -hpskracker -t <target model>pskracker -t <target model> -b <bssid>pskracker -t <target model> -s <serial number>pskracker -t <target model> -b <bssid> -s <serial number>pskracker -t <target model> -Wpskracker -t <target model> -Gpskracker -t <target model> -f