WPS Brute Forcing - Vulnerable Devices
Please help to build a database of vulnerable devices, that can be cracked by using the WPS-Exploit found by Stefan Viehböck and Craig Heffner - all information will be released under CC BY 3.0
All valid entries will be available at: https://docs.google.com/spreadsheet/ccc?key=0Ags-JmeLMFP2dFp2dkhJZGIxTTFkdFpEUDNSSHZEN3c
Sign in to Google to save your progress. Learn more
Whats your Device? *
Please Type in the exact name of the device, without vendor (e.g WNDR7000v3)
Who is the vendor?
Who build your device?
What kind of device do you have?
Please add the type of your device (e.g. Router, Bridge, Access Point, Modem...)
What firmware are you running? *
Please enter the firmware - it's important so we can see, when the vendors release a bugfix (e.g 1.0.2.3 - if you can'f find it, just use "unknown")
Is WPS PIN enabled by default?
Did you have to enable WPS or was it already enabled?
Clear selection
Is your device vulnerable against the WPS attack? *
If you choose maybe, please write in the comments (e.g. device locks wps down after x attempts, needs to be rebooted)
Wich tool did you use? *
Please state the tool you used and the version (e.g Reaver 1.2, WPScrack, Theiver...)
How long did it take you?
Just give an estimate.
Can WPS be deactivated? *
Please state, if the WPS feature can be switched off completly
What are the first twentyfour bits of your MAC-adress ( not required)?
It makes identification of the vendor easier  (e.g 00:11:22)
Who are you (not required)?
If you want, you can add your Nickname/Twitter-account etc - NSFW/fakes will be deleted - don't post sensitive information
PIN (!not required!)
You can add the found PIN (only if you want!) Maybe we can find some kind of pattern.
Comments
Found something interesting? Just leave it there
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy