Add support for the WPS Pixie Dust attack, allowing GhostESP to exploit vulnerable WPS implementations and recover WPA/WPA2 passphrases via the offline Pixie Dust method.
This would complement the existing WiFi attack suite (deauth, handshake/PMKID capture, etc.) and give users another practical vector for authorized wireless security testing.
Use case: Quickly test WPS-enabled access points for the well-known Pixie Dust vulnerability during security audits.
Add support for the WPS Pixie Dust attack, allowing GhostESP to exploit vulnerable WPS implementations and recover WPA/WPA2 passphrases via the offline Pixie Dust method.
This would complement the existing WiFi attack suite (deauth, handshake/PMKID capture, etc.) and give users another practical vector for authorized wireless security testing.
Use case: Quickly test WPS-enabled access points for the well-known Pixie Dust vulnerability during security audits.