View Issue Details
|ID||Project||Category||View Status||Date Submitted||Last Update|
|0004299||Kali Linux||[All Projects] Queued Tool Addition||public||2017-10-08 17:00||2020-06-17 14:58|
|Priority||normal||Severity||minor||Reproducibility||have not tried|
|Target Version||Fixed in Version|
|Summary||0004299: PSKracker is a new WPA/WPS toolkit for generating default keys/pins|
|Description||PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C. This is useful for testing/auditing wireless networks and contains bleeding edge algorithms. More are to be supported in the future as they are discovered. Piping into password recovery tools is supported as well (hashcat, aircrack, pyrit, etc).|
||This tool is very interesting. cloned it yesterday and it looks very promising. Thanks|
License: GNU v3.0 (https://github.com/soxrok2212/PSKracker/blob/master/LICENSE)
Description: PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C.
||This tool could be interesting but until it has better documentation, I would not recommend adding it to Kali.|
||What type of documentation are you looking for? Anything specific?|
Well, some more documentation would be great. Like:
* Complete usage examples
* Howto obtain 'serial number'
What does the program do? It claims to be an all-in-one toolkit but doesn't have any usage information. Does it manage the wireless interface? Does it handle packet injection?
Why should someone use this tool over others, like aircrack-ng, wifite, pixiewps, etc?
Well, per the description, "PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C". This tool does not manage wireless interfaces or do any sort of hardware managing/controlling.
Reaver, bully, aircrack etc are all used primarily for
a. gathering data
b. testing some output from such gathered data
This tool is designed to use the gathered data and produce some output to be used for testing the security of your network... i.e for select ATT models, pass in the encryption type and model number and the output will be all possible 2.1 billion keys (pipe into hashcat with the network capture and you will find the key). For Xfinity, pass in the Mac, security type, and model and you will get the XHS-XXXXXXXX key. The documentation would be HUGE if every detail were included in the repository itself. Feel free to ask any more questions!
||We are not the audience for your tool, your potential users are. If they cannot figure out what it does and see examples of it working in the documentation, they will not use it, nor will it be packaged.|
I've added documentation to the Wiki.
Please let me know if there is anything more I can do.
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
|2017-10-08 17:00||soxrok2212||New Issue|
|2017-10-08 17:02||soxrok2212||Note Added: 0007489|
|2017-10-08 19:21||kimocoder||Note Added: 0007492|
|2017-10-09 10:42||g0tmi1k||Note Added: 0007494|
|2017-10-09 17:00||dookie||Note Added: 0007501|
|2017-10-09 17:50||soxrok2212||Note Added: 0007503|
|2017-10-09 18:11||kimocoder||Note Added: 0007504|
|2017-10-09 19:30||dookie||Note Added: 0007505|
|2017-10-14 15:42||soxrok2212||Note Added: 0007527|
|2017-10-19 14:50||dookie||Note Added: 0007546|
|2018-01-29 10:14||g0tmi1k||Priority||high => normal|
|2018-02-21 09:35||g0tmi1k||Product Version||2017.2 =>|
|2018-05-07 01:51||soxrok2212||Note Added: 0009120|
|2019-12-09 13:30||g0tmi1k||Severity||minor => feature|
|2020-03-25 13:32||g0tmi1k||Note Added: 0012538|
|2020-03-25 13:32||g0tmi1k||Status||new => acknowledged|
|2020-03-25 13:32||g0tmi1k||Category||New Tool Requests => Queued Tool Addition|
|2020-06-17 14:58||g0tmi1k||Severity||feature => minor|