SILICA 7.21 Release Notes
WPS offline bruteforcing (AKA Pixie Dust Attack)
- Access Points using Ralink chipsets lack randomization of the E-S1 and
E-S2 nonces. This attack will do an offline brute force of the WPS PIN,
reducing the time that it usually take to obtain the Access Point
credentials.
New WPS option "try only default PINs"
- When this menu option is selected, only the fastest WPS attacks are
carried on.
Denial of service enhancement
- The "Disable this network" module will now send a continuous stream of
deauthentication packets.
Bug Fixes:
- Issue that prevented connection to some WLANs using WPA encryption.
- Issue with the WPS bruteforcing module.
- Wireless channel selection fixes.
Demo: Pixie Dust WPS Attack