Bug 204030

Summary: [new port] security/pixiewps: tool used to bruteforce offline the WPS pin
Product: Ports & Packages Reporter: Franz Bettag <franz>
Component: Individual Port(s)Assignee: Mark Felder <feld>
Status: Closed FIXED    
Severity: Affects Only Me CC: feld
Priority: ---    
Version: Latest   
Hardware: Any   
OS: Any   
Attachments:
Description Flags
pixiewps shar archive none

Description Franz Bettag 2015-10-26 12:37:28 UTC
Created attachment 162462 [details]
pixiewps shar archive

Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some APs (pixie dust attack). It is meant for educational purposes only. All credits for the research go to Dominique Bongard.

I already have my patch upstreamed to make it compile/work with FreeBSD, so this made this one easy.

Thanks for your consideration

Franz Bettag
Comment 1 commit-hook freebsd_committer freebsd_triage 2015-12-02 17:24:03 UTC
A commit references this bug:

Author: feld
Date: Wed Dec  2 17:23:33 UTC 2015
New revision: 402839
URL: https://svnweb.freebsd.org/changeset/ports/402839

Log:
  Pixiewps is a tool written in C used to bruteforce offline the WPS pin
  exploiting the low or non-existing entropy of some APs (pixie dust attack).
  It is meant for educational purposes only.
  All credits for the research go to Dominique Bongard.

  WWW: https://github.com/wiire/pixiewps

  PR:		204030
  Submitted by:	Franz Bettag <franz@bett.ag>

Changes:
  head/security/Makefile
  head/security/pixiewps/
  head/security/pixiewps/Makefile
  head/security/pixiewps/distinfo
  head/security/pixiewps/pkg-descr
Comment 2 Mark Felder freebsd_committer freebsd_triage 2015-12-02 17:24:18 UTC
I'm not thrilled about using a git revision instead of using a proper release, but there's not much to be done when upstream is lazy and doesn't cut releases when they make improvements.
Comment 3 Mark Felder freebsd_committer freebsd_triage 2015-12-02 17:24:33 UTC
committed with minor changes