LinuxCommandLibrary

bully

Brute-force WPS pins to recover WPA/WPA2 passphrases

TLDR

Brute-force the WPS pin of an access point

$ bully -b "[mac]" -c "[channel]" -B "[interface]"
copy
Display help
$ bully -h
copy

SYNOPSIS

bully [options] interface

DESCRIPTION

bully is a WPS (Wi-Fi Protected Setup) brute-force attack tool that exploits vulnerabilities in the WPS protocol to recover the WPA/WPA2 passphrase. It attempts to crack the 8-digit WPS PIN through systematic guessing.
Before using bully, network information must be gathered using tools like airmon-ng and airodump-ng to identify the target's MAC address and channel.

PARAMETERS

-b, --bssid mac

Target access point MAC address
-c, --channel channel
Target wireless channel
-B, --bruteforce
Enable brute-force mode
-h, --help
Display help information

CAVEATS

Only use on networks you own or have explicit authorization to test. WPS attacks are detectable and may trigger lockouts. Many modern routers have WPS protections that limit attack effectiveness. Unauthorized use is illegal.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community