, , , ,

KALI LINUX TOOLS – BULLY (Wireless Attacks)

How To Hack Wifi – Breaking a WPS PIN to Get the Password with Bully

Kali LinuxBully They are many ways to Hack Wifi using Kali Linux Hacking Distribution, including cracking WEP and WPA2 passwords and creating an Evil Twin and Rogue AP.

Kali Linux Brute force wifi Hack Bully

Today in our series of articles about Kali Linux Tools, we share with you how  to break a WPS Pin to get the Password with Bully the new WPS-Hacking tool.

Kali Linux Tools – Bully

Bully is a new implementation of the WPS brute force attack, written in C. It is conceptually identical to other programs, in that it exploits the (now well known) design flaw in the WPS specification.

It has several advantages over the original reaver code. These include fewer dependencies, improved memory and cpu performance, correct handling of endianness, and a more robust set of options. It runs on Linux, and was specifically developed to run on embedded Linux systems (OpenWrt, etc) regardless of architecture.

Bully provides several improvements in the detection and handling of anomalous scenarios. It has been tested against access points from numerous vendors, and with differing configurations, with much success.

Why WPS Is So Vulnerable

Kali Linux Wireless Security

WPS stands for Wi-Fi Protected Setup and was designed to make setting a secure AP simpler for the average homeowner. First introduced in 2006, by 2011 it was discovered that it had a serious design flaw. The WPS PIN could be brute-forced rather simply.

With only 7 unknown digits in the PIN, there are just 9,999,999 possibilities, and most systems can attempt that many combinations in a few hours. Once the WPS PIN is discovered, the user can use that PIN to find the WPA2 preshared key (password).

Since a brute-force attack against a WPA2 protected AP can take hours to days, if this feature is enabled on the AP and not upgraded, it can be a much faster route to getting the PSK.

Brute Force WPS PIN With Kali Linux

All the steps are explained on a Video on our Youtube Channel you can subscribe to it by this link, they are many other tutorials that you can learn about bypassing, hacking and others basics tutorials using kali linux Hacking Distribution.

Disclaimer: This tutorial is for educational purposes only and we are NOT responsible in any way for how this information is used, use it at your own risk.

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to Share it with your friends. with Love and Prosperity K4LINUX-TEAM.


Source : Bully

What do you think?

-2 points
Upvote Downvote

Total votes: 12

Upvotes: 5

Upvotes percentage: 41.666667%

Downvotes: 7

Downvotes percentage: 58.333333%

Comments

Don't worry, we don't spam

Leave a Reply

Your email address will not be published. Required fields are marked *