What is a pixie dust attack?
How does pixie dust attack work? What is the flaw that only certain routers contain to being vulnerable for Pixie-Dust attack?
A Pixie Dust attack works by brute forcing the key for a protocol called WPS. WPS was intended to make accessing a router easier, and it did - for attackers.
A WPS Pin consists of 8 digits - two Pre-Shared-Keys or PSKs. Each PSK has half the pin. To understand how a Pixie Dust attack works, you'll need to understand how the requests to the AP work:
1. Computer sends - EAPOL Start
2. Router sends - EAP-Request for the Identity
3. Computer sends - Responds with the Identity
4. Router sends - EAP request
5. Computer sends - EAP response
...
And it loops these requests a few more times before the credentials are sent.
However, during this process, your computer has been given the following:
Diffie Hellman Public key of the Enrollee
Diffie Hellman Public key of the Registrar
Two hashes - of the WPS PIN
Enrolee nonce and a derived authkey
; Now in order to successfully bruteforce the previously mentioned PSKs, you'll need two more nonces - which are supposed to be randomly generated. And this is the most important part - since the random numbers are not really random but are derivations of the hashes (or are just zeroes) then we can bruteforce this key, even on a slow system! It will work if the implementation on the router is bad (which it is in most cases) and you should be able to find a list of vulnerable routers on the internet.
tl;dr: We bruteforce a badly generated key because of a flaw in how the random numbers are generated in many routers.