PixieWPS is an offline brute-forcing tool that is utilized to reverse the PIN of a WPS wireless access point. The name of PixieWPS comes from the Pixie-Dust attack that was discovered by Dominique Bongard. This vulnerability allows for the brute forcing of the WPS PIN. (For more detailed information on this vulnerability, see Bongard's presentation: https://passwordscon.org/wp-content/uploads/2014/08/Dominique_Bongard.pdf.)
To access PixieWPS, type the following into Command Prompt:
# pixiewps
The command will give you the different command options. In order for PixieWPS to work properly, a good deal of information must be obtained. This includes the following:
- Enrollee public key
- Registrant public key
- Enrollee Hash-1
- Enrollee Hash-2
- Authentication session key
- Enrollee nonce
Because of all these components that are required, PixieWPS is often run as part of another tool, such as Wifite.