bully
Brute-force WPS pins to recover WPA/WPA2 passphrases
TLDR
Brute-force the WPS pin of an access point
SYNOPSIS
bully [options] interface
DESCRIPTION
bully is a WPS (Wi-Fi Protected Setup) brute-force attack tool that exploits vulnerabilities in the WPS protocol to recover the WPA/WPA2 passphrase. It attempts to crack the 8-digit WPS PIN through systematic guessing.
Before using bully, network information must be gathered using tools like airmon-ng and airodump-ng to identify the target's MAC address and channel.
PARAMETERS
-b, --bssid mac
Target access point MAC address-c, --channel channel
Target wireless channel-B, --bruteforce
Enable brute-force mode-h, --help
Display help information
CAVEATS
Only use on networks you own or have explicit authorization to test. WPS attacks are detectable and may trigger lockouts. Many modern routers have WPS protections that limit attack effectiveness. Unauthorized use is illegal.
SEE ALSO
reaver(1), airmon-ng(8), airodump-ng(8)
