Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe?

      Bully: WPS Brute Force Attack

      1 post in this topic

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Introduction

      Bully is a new implementation of the WPS (Wifi Protected Setup) brute force attack. It’s almost identical as other already existing WPS brute force attack tools, but Bully represents an improved version of Reaver and includes a few advantages. You can take a look at Brute Force Attack Against WPS – Reaver, to see its features and compare them to the Bully.
      WPS (Wifi Protected Setup)

      WPS was introduced in 2006, and the goal of the protocol is to allow home users who know little of wireless security to set up Wi-Fi Protected Access, as well as making it easy to add new devices to an existing network without entering long passphrases. In December 2011 a flaw was revealed that affects wireless routers with the WPS feature. That flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network’s WPA/WPA2 pre-shared key

      Hidden Content

        Give reaction to this post to see the hidden content.

      • Like 3

      Share this post


      Link to post
      Share on other sites

      Create an account or sign in to comment

      You need to be a member in order to leave a comment

      Create an account

      Sign up for a new account in our community. It's easy!

      Register a new account

      Sign in

      Already have an account? Sign in here.

      Sign In Now
      Sign in to follow this  

      • Similar Content

        • By itsMe?

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe?

          Hidden Content
          Give reaction to this post to see the hidden content.  
           Fixed the overplay of some accounts with games.
          -Added information about the number of simulated hours in games.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe?

          Hidden Content
          Give reaction to this post to see the hidden content. Brute forcing tool for FTP server. FTPBruter can work in any OS if they have and support Python 3.
          Feature
              Brute force a FTP server with a username or a list of usernames (That's all).
          To-do lists
              Check anonymous login.
              Auto-change proxy with brute force.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe?

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe?

          Hidden Content
          Give reaction to this post to see the hidden content.  
          Instainsane is a Shell Script to perform multi-threaded brute force attack against Instagram, this script can bypass login limiting and it can test infinite number of passwords with a rate of about 1000 passwords/min with 100 attemps at once.

          Legal disclaimer:
          Usage of InstaInsane for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
          Features
              Multi-thread (100 attempts at once)
              Save/Resume sessions
              Anonymous attack through TOR
              Check valid usernames
              Default password list (best +39k 8 letters)
              Check and Install all dependencies

          Hidden Content
          Give reaction to this post to see the hidden content.