![What additional steps can be taken on a wireless network penetration test after acquiring WPS pin? - Information Security Stack Exchange What additional steps can be taken on a wireless network penetration test after acquiring WPS pin? - Information Security Stack Exchange](https://i.stack.imgur.com/PxFvp.png)
What additional steps can be taken on a wireless network penetration test after acquiring WPS pin? - Information Security Stack Exchange
![Automated Pixie Dust Attack: receiving WPS PINs and Wi-Fi passwords without input any commands - Ethical hacking and penetration testing Automated Pixie Dust Attack: receiving WPS PINs and Wi-Fi passwords without input any commands - Ethical hacking and penetration testing](https://miloserdov.org/wp-content/uploads/2017/09/24.jpg)
Automated Pixie Dust Attack: receiving WPS PINs and Wi-Fi passwords without input any commands - Ethical hacking and penetration testing
![Effective WPS PINs attack based on known PIN and PIN generation algorithms - Ethical hacking and penetration testing Effective WPS PINs attack based on known PIN and PIN generation algorithms - Ethical hacking and penetration testing](https://miloserdov.org/wp-content/uploads/2017/11/05.png)