Check your wifi security analyzing the pin protocol WPS WPA / WPA2.
advertisement
Naam | WPS PinGen |
---|---|
Versie | 1.0.0 |
Update | 09 dec. 2016 |
Grootte | 3 MB |
Categorie | Tools |
Installaties | 50K+ |
Ontwikkelaar | Sweefy |
Android OS | Android 5.0+ |
Google Play ID | wifi.es.wpspingenerator |
WPS PinGen · Beschrijving
Check your wifi security analyzing the pin protocol WPS WPA / WPA2.
This application makes use of the WPS protocol and tries the connection to check if the network is vulnerable.
The WPS protocol allows to connect to a WiFi network using an 8-digit numeric key that normally comes pre-defined in the router, many routers have it disabled, but another so many have it active with the default pin, which according to the model we know.
WPS Analizer Implements various pin generation algorithms and many known default pins.
If you are ROOT you will be able to recover the WPA / WP2 passwords through the WPS connection.
The use is very simple, when scanning the networks around us will appear with the logo in red, these are "secure" networks in quotes, have the WPS protocol disabled and the default password is not known. The blue networks, which are networks that have the WPS activated but have not found known pins, in this case the application allows you to test with the most common, and the greens are the most vulnerable networks, since the default pin Is known.
TEST IT IN YOUR NETWORK AND IF IT IS VULNERABLE REPARE IT. Disable the wps and change the password for a strong and personalized.
I DO NOT MAKE RESPONSIBLE FOR THE MISUSE YOU MAY BE GIVEN, THE INTRUSION ON ANY NETWORKS IS PENED BY LAW.
This application makes use of the WPS protocol and tries the connection to check if the network is vulnerable.
The WPS protocol allows to connect to a WiFi network using an 8-digit numeric key that normally comes pre-defined in the router, many routers have it disabled, but another so many have it active with the default pin, which according to the model we know.
WPS Analizer Implements various pin generation algorithms and many known default pins.
If you are ROOT you will be able to recover the WPA / WP2 passwords through the WPS connection.
The use is very simple, when scanning the networks around us will appear with the logo in red, these are "secure" networks in quotes, have the WPS protocol disabled and the default password is not known. The blue networks, which are networks that have the WPS activated but have not found known pins, in this case the application allows you to test with the most common, and the greens are the most vulnerable networks, since the default pin Is known.
TEST IT IN YOUR NETWORK AND IF IT IS VULNERABLE REPARE IT. Disable the wps and change the password for a strong and personalized.
I DO NOT MAKE RESPONSIBLE FOR THE MISUSE YOU MAY BE GIVEN, THE INTRUSION ON ANY NETWORKS IS PENED BY LAW.