Wash
Wash Description
Wash is a utility for identifying WPS enabled access points. It can survey from a live interface or it can scan a list of pcap files.
Wash is an auxiliary tool designed to display WPS enabled Access Points and their main characteristics. Wash is included in the Reaver package.
Homepage: https://github.com/t6x/reaver-wps-fork-t6x
Author: Tactical Network Solutions, Craig Heffner, t6_x, DataHead, Soxrok2212
License: GPLv2
Wash Help
Usage:
sudo wash -i wlan0
Required Arguments: -i, --interface=<iface> Interface to capture packets on -f, --file [FILE1 FILE2 FILE3 ...] Read packets from capture files Optional Arguments: -c, --channel=<num> Channel to listen on [auto] -o, --out-file=<file> Write data to file -n, --probes=<num> Maximum number of probes to send to each AP in scan mode [15] -D, --daemonize Daemonize wash -5, --5ghz Use 5GHz 802.11 channels -s, --scan Use scan mode -u, --survey Use survey mode [default] -a, --all Show all APs, even those without WPS -j, --json print extended WPS info as json -h, --help Show help
-a // --all
The option -a of Wash will list all access points, including those without WPS enabled.
-j // --json
The extended WPS information (serial, model…) from the AP probe answer will be printed in the terminal (in json format)
Notice that wash output can be piped into other commands.
Wash Usage Example
Show all WPS enabled APs using wireless interface (-i wlan0):
sudo wash -i wlan0 Wash v1.6.3 WiFi Protected Setup Scan Tool Copyright (c) 2011, Tactical Network Solutions, Craig Heffner BSSID Ch dBm WPS Lck Vendor ESSID -------------------------------------------------------------------------------- B8:A3:86:0C:25:64 1 -77 1.0 No RalinkTe RT-36 28:28:5D:A4:E9:66 1 -75 1.0 No RalinkTe Keenetic-0433 B8:A3:86:0F:1D:F4 1 -81 1.0 No RalinkTe DIR-320NRU 00:1F:CE:C9:91:C2 1 -79 2.0 No RealtekS RT-136 FC:F5:28:48:9B:CC 1 -75 1.0 No RalinkTe wfi 30-64 C0:4A:00:DA:CC:D8 1 -79 1.0 Yes AtherosC TP-LINK_DACCD8 EA:37:7A:99:BE:F0 1 -79 1.0 No RalinkTe FTTX772802 88:A6:C6:DA:C7:8D 3 -41 2.0 No RealtekS RT-WiFi_C78D EC:43:F6:D0:11:FA 3 -77 1.0 No RalinkTe RT-757261 EE:43:F6:CC:FD:B0 3 -77 1.0 No RalinkTe Zyxel-49 E4:6F:13:23:1E:96 4 -77 2.0 No RealtekS Супер семья 74:B5:7E:18:57:54 5 -71 1.0 No RealtekS RT-112 84:C9:B2:52:F6:37 5 -81 1.0 No AtherosC IMAX 28:28:5D:6C:16:24 6 -77 1.0 No RalinkTe ZyXEL_59
Show all WPS enabled APs on the specified channel (-c 6) using wireless interface (-i wlan0):
wash -i wlan0 -c 6 Wash v1.6.3 WiFi Protected Setup Scan Tool Copyright (c) 2011, Tactical Network Solutions, Craig Heffner BSSID Ch dBm WPS Lck Vendor ESSID -------------------------------------------------------------------------------- 64:66:B3:48:99:9A 6 -75 1.0 Yes AtherosC RT-733322 28:28:5D:6C:16:24 6 -77 1.0 No RalinkTe ZyXEL_59 60:A4:4C:E0:FD:94 6 -77 2.0 No Broadcom Ivan S. 90:F6:52:96:C8:14 6 -75 1.0 No AtherosC TP-LINK_85 30:B5:C2:69:C9:16 6 -77 1.0 No AtherosC TP-LINK_22
How to install Wash
The program is pre-installed on Kali Linux.
Installation on Linux (Debian, Mint, Ubuntu)
Wash is included in the Reaver package. To get Wash it is enough to install Reaver.
Wash Screenshots
Wash Tutorials
- New Wash and Reaver Features
- How to hack Wi-Fi using Reaver
- Three ways to put wireless interface in Monitor mode and Managed mode
- USB Wi-Fi Adapters with monitor mode and wireless injection (100% compatible with Kali Linux) 2021
Related tools
- airgeddon (100%)
- PixieWPS (100%)
- Reaver (reaver-wps-fork-t6x) (100%)
- WiFite (67%)
- Router Scan (67%)
- Airmon-ng (RANDOM - 53.8%)
Comments are Closed