Skip to content

anbuinfosec/wipwn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

72 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

WIPWN - WiFi WPS Penetration Testing Tool

Fast and automated WiFi WPS PIN cracking tool with advanced attack features.

⚠️ Note: WIPWN is optimized for Termux From F-Dorid on Android. For best results and compatibility, use Termux. Kali/Debian support is legacy.


πŸ“¦ Installation

Prerequisites

  • Python 3.8+
  • aircrack-ng suite
  • wpa_supplicant
  • pixiewps
  • Termux

Install (Termux)

pkg update && pkg upgrade -y
pkg install root-repo -y
pkg install git python wpa-supplicant pixiewps iw openssl -y
pkg install tsu -y || pkg install sudo -y
git clone https://github.com/anbuinfosec/wipwn
cd wipwn
chmod +x main.py

πŸ—‘οΈ Uninstall

# Remove wipwn
rm -rf /path/to/wipwn
# Remove sessions/data (optional)
rm -rf ~/.Wipwn/

πŸš€ Basic Commands

Start WiFi Scanning

sudo python3 main.py -i wlan0

Pixie Dust Attack

sudo python3 main.py -i wlan0 -b AA:BB:CC:DD:EE:FF -K

Brute Force Attack

sudo python3 main.py -i wlan0 -b AA:BB:CC:DD:EE:FF -B

Dictionary Attack

sudo python3 main.py -i wlan0 -b AA:BB:CC:DD:EE:FF --dictionary-attack --wordlist /path/to/wordlist.txt

With Results Saving

sudo python3 main.py -i wlan0 -K -w

Auto-add to Vulnerability List

sudo python3 main.py -i wlan0 -K --auto-vuln-list

Resume Session

sudo python3 main.py -i wlan0 --resume-session mysession

πŸ“‹ Command Examples

1. Basic Target Attack

sudo python3 main.py -i wlan0 -b AA:BB:CC:DD:EE:FF -K
  • -i wlan0 : WiFi interface
  • -b AA:BB:CC:DD:EE:FF : Target BSSID
  • -K : Pixie Dust attack

2. Multi-threaded Bruteforce

sudo python3 main.py -i wlan0 --online-bruteforce --bruteforce-threads 8 --pin-limit 5000

3. Detect Weak Algorithms

sudo python3 main.py -i wlan0 --detect-weak-algo

4. Advanced Reconnaissance

sudo python3 main.py -i wlan0 --advanced-recon --signal-analysis

5. Bypass Rate Limiting

sudo python3 main.py -i wlan0 -b AA:BB:CC:DD:EE:FF -K --detect-rate-limit --bypass-rate-limit

6. Full Penetration Test

sudo python3 main.py -i wlan0 \
    -K \
    --advanced-recon \
    --detect-weak-algo \
    --spoof-mac \
    --html-report \
    --auto-vuln-list

7. Session Management

# Create session
sudo python3 main.py -i wlan0 -b AA:BB:CC:DD:EE:FF -K -s session1

# Resume session
sudo python3 main.py -i wlan0 --resume-session session1

# List sessions
sudo python3 main.py --list-sessions

8. Generate Reports

sudo python3 main.py -i wlan0 --html-report --detailed-report --report-dir ./reports

9. Custom PIN Testing

sudo python3 main.py -i wlan0 -b AA:BB:CC:DD:EE:FF -p 12345678

10. Push Button Connect

sudo python3 main.py -i wlan0 --pbc

πŸ› οΈ Common Options

Attack Options

-K, --pixie-dust           Pixie Dust attack
-B, --bruteforce           Online bruteforce
-F, --pixie-force          Pixiewps force mode
--pbc                      Push button connect
--pin PIN                  Use specific PIN
--dictionary-attack        Dictionary password attack

Network Options

-i, --interface            Interface (required)
-b, --bssid               Target BSSID
--session ID              Save/restore session
--channel-hop             Enable channel hopping
--spoof-mac               Spoof MAC address

Detection & Bypass

--detect-rate-limit       Check for rate limiting
--bypass-rate-limit       Attempt bypass
--detect-weak-algo        Find weak algorithms
--advanced-recon          Network fingerprinting

Results

-w, --write               Save credentials
--auto-vuln-list          Add to vulnerability list
--html-report             Generate HTML report
--json-output FILE        Save results as JSON
--csv-output FILE         Save results as CSV

Performance

-t, --timeout SEC         Receive timeout
-d, --delay SEC           Delay between attempts
-l, --lock-delay SEC      Wait after lock
--bruteforce-threads N    Number of threads

πŸ“ Important Files

~/.Wipwn/
β”œβ”€β”€ sessions/              # Saved sessions & cracked networks
β”œβ”€β”€ wordlists/             # Dictionary files
└── reports/               # Generated reports

vulnwsc.txt              # Vulnerability list

βœ… Output Indicators

  • [+] = Success
  • [i] = Information
  • [!] = Warning
  • [-] = Error
  • [?] = Question

🎨 Network Status Colors

Networks are marked with color indicators during scanning:

  • 🟒 Green - Possibly vulnerable (WPS enabled, no protection detected)
  • πŸ”΄ Red - WPS locked (AP is actively blocking WPS attempts)
  • 🟑 Yellow - Already stored (Network credentials cracked and saved in vulnwsc.txt)
  • βšͺ White - Maybe vulnerable (WPS unclear, needs further analysis)

πŸ”§ Troubleshooting

Interface Not Found

iwconfig
sudo airmon-ng

Permission Denied

sudo python3 main.py -i wlan0

Target Not Responding

sudo python3 main.py -i wlan0 -b BSSID -K -t 20

Rate Limited

sudo python3 main.py -i wlan0 -b BSSID -K --bypass-rate-limit

πŸ”„ Quick Reference

# Scan only
sudo python3 main.py -i wlan0

# Quick attack (Pixie Dust + Save)
sudo python3 main.py -i wlan0 -b BSSID -K -w

# Full test with reports
sudo python3 main.py -i wlan0 --advanced-recon --html-report -w

# Bruteforce
sudo python3 main.py -i wlan0 -b BSSID -B --bruteforce-threads 8

# Dictionary attack
sudo python3 main.py -i wlan0 -b BSSID --dictionary-attack --wordlist wordlist.txt

βš–οΈ Legal Notice

This tool is for authorized security testing ONLY.

  • Only test networks you own or have permission to test
  • Unauthorized access is illegal
  • User assumes all responsibility

OneShot v0.0.2 | Modified by @anbuinfosec