Skip to content

UsamaMatrix/WPS-Exploitation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WPS Exploitation

A Python script for exploiting WPS to retrieve WPA/WPA2 passphrases using the Reaver tool.

For LINUX based OS only

Features

  • Interactive interface for wireless exploitation.
  • Real-time output display for executed commands.
  • Supports error handling and user confirmation.

Requirements

  • Python 3.6+
  • Tools: Reaver, Colorama, Pyfiglet

Installation

  1. Clone the repository:
    git clone https://github.com/UsamaMatrix/WPS-Exploitation.git
    cd WPS-Exploitation
  2. Install dependencies:
    pip install -r requirements.txt
  3. Make it executable:
    sudo chmod +x wps_exploitation.py   

Usage

  1. Put your wireless interface into monitor mode (e.g., airmon-ng start wlan0).
  2. Run the script:
    sudo python3 wps_exploitation.py
    

Wordlist

If you are planning to use brute force with WPS, you will need a wordlist. You can use the wordlist provided in this repository or download one from SecLists.


Disclaimer

For ethical use only. This script is intended for educational purposes and authorized testing on your own networks.

Contributing

Feel free to fork this repository and submit pull requests. Please ensure your contributions follow ethical guidelines.

Author

Muhammad Usama - Cyber Security Specialist You can connect with me on LinkedIn.

About

A Python script for exploiting WPS to retrieve WPA/WPA2 passphrases using Reaver.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages