Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Break WPS PINs Using Airgeddon & Bully Full Tutorial: https://nulb.app/x49tg Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 008 If you're squaring up against a WPA or WPA2 network with a strong password, you may feel like you're at the end of your options if you can't brute-force or social engineer the password. Fortunately, many routers have a flaw in the WPS setup pin feature that makes bypassing any WPA-based security trivial. Using a tool called Bully, we can exploit weak entropy in the keys many routers use to encrypt the WPS pin, allowing us to break the WPS setup pin in vulnerable routers to dump the Wi-Fi password. We will use the WPS Pixie-Dust attack option in the Airgeddon wireless attack framework, as it gives us the most flexibility in selecting and attacking targets. Tool: https://github.com/v1s1t0r1sh3r3/airgeddon Guide to picking a network adapter: https://nulb.app/x45qf To learn more, check out the article: https://nulb.app/x49tg Follow Null Byte on: Twitter: https://twitter.com/nullbyte Flipboard: https://flip.it/3.Gf_0 Website: https://null-byte.com Vimeo: https://vimeo.com/channels/nullbyte