We use cookies and other technologies on this website to enhance your user experience.
By clicking any link on this page you are giving your consent to our Privacy Policy and Cookies Policy.

À propos de Wifi WPS Connect Dumpper

Wifi WPS Dumpper est un outil pour vérifier la vulnérabilité des réseaux sans fil WPS

Wifi WPS Connect Dumpper checks the security of your network using WPS protocol.

This protocol allows you to connect to a WiFi network using an 8-digit pin number that usually is predefined in the router, the problem is that the pin of many routers from different companies is known or is known how to calculate it.

This app uses these pins to try the connection and check if the network is vulnerable. It implements several known algorithms for pin generation and some default pins. Also calculates default key for some routers, allows you to view WiFi passwords stored on the device, scans the devices connected to your network and analyzes the quality of the WiFi channels.

Use is very simple, when scanning networks around us, you will see networks with a red cross, these are "secure" networks, they have disabled the WPS protocol and default password is unknown.

Those that appear with a question mark have enabled the WPS protocol, but the pin is unknown, in this case the application allows you to test the most common.

Finally, those with a green tick are most likely vulnerable, have the WPS protocol enabled and the connection pin is known. It may also be that the router has WPS disabled, but the password is known, in this case it also appears in green and can be connected to the key.

For pin connection you need to be ROOT user in less than Android 5.0 (Lollipop) versions. The advantage of being ROOT is that you can show network password if the pin connection is successful we will, otherwise you will connect to the network but cannot show it. Each feature will be enabled or disabled depending on the situation of each terminal.

NOTICE: Not all networks are vulnerable and that the network appears as such does not guarantee 100% that it is, several companies have updated firmware of their routers to correct the fault.

TRY IT ON YOUR NETWORK AND IF YOU ARE VULNERABLE... REMEDY IT. Turn off WPS and change password for a strong and personalized.

I AM NOT RESPONSIBLE FOR ANY MISUSE, INTRUSION INTO FOREIGN NETWORKS IS PUNISHABLE BY LAW.

From Android 6 (Marshmallow) it is necessary to grant location permissions. It is a new requirement added by Google in this version. More information in: https://developer.android.com/about/versions/marshmallow/android-6.0-changes.html#behavior-hardware-id

Some Samsung models use encryption and do not show real passwords, they show a long series of hexadecimal digits. Look for information on the internet or contact me if you want to know how to decrypt them.

Pin connection does not work on LG models with Android 7 (Nougat). It's a problem with LG's own software.

Please understand how the application works before giving an evaluation.

Send any proposal, failure or comment to [email protected], thanks.

Acknowledgments:

Zhao Chunsheng, Stefan Viehböck, Justin Oberdorf, Kcdtv, Patcher, Coeman76, Craig, Wifi-Libre, Lampiweb, David Jenne, Alessandro Arias, Sinan Soytürk, Ehab HoOoba.

Quoi de neuf dans la dernière version 1.2.1b

Last updated on Nov 20, 2018

+Added support to Android P

Chargement de la traduction...

Informations Application supplémentaires

Dernière version

Demande Wifi WPS Connect Dumpper mise à jour 1.2.1b

Telechargé par

Ibnu Moeh Harris

Nécessite Android

Android 4.0+

Voir plus

Wifi WPS Connect Dumpper Captures d'écran

Langues
Abonnez-vous à APKPure
Soyez le premier à avoir accès à la sortie précoce, aux nouvelles et aux guides des meilleurs jeux et applications Android.
Non merci
S'inscrire
Abonné avec succès!
Vous êtes maintenant souscrit à APKPure.
Abonnez-vous à APKPure
Soyez le premier à avoir accès à la sortie précoce, aux nouvelles et aux guides des meilleurs jeux et applications Android.
Non merci
S'inscrire
Succès!
Vous êtes maintenant souscrit à notre newsletter.