Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 828

Pixie Dust Attack

What is Pixie Dust Attack?

Pixie Dust AttackAn offline attack that recovers the WPS PIN of a vulnerable access point in seconds by exploiting weak nonces in the WPS registration protocol.


The Pixie Dust attack was published in 2014 by Dominique Bongard. He observed that many access points use predictable or zero pseudo-random number generators for the E-S1 and E-S2 nonces in the WPS M3 message. Because the access point reveals the hashes E-Hash1 and E-Hash2 in M3 before the client commits, an attacker can capture a single M1-M3 exchange and brute-force the PIN halves entirely offline in seconds to minutes. Tools like pixiewps and Reaver's -K mode automate this. Chipsets from Ralink, Broadcom, Realtek and MediaTek were widely affected. The fix is to disable WPS or upgrade firmware that uses a strong PRNG.

Examples

  1. 01

    Capturing one M1-M3 WPS exchange and recovering the PIN with pixiewps in under 30 seconds.

  2. 02

    Reaver -K mode breaking a Ralink-based AP without sending any online PIN attempts.

Frequently asked questions

What is Pixie Dust Attack?

An offline attack that recovers the WPS PIN of a vulnerable access point in seconds by exploiting weak nonces in the WPS registration protocol. It belongs to the Attacks & Threats category of cybersecurity.

What does Pixie Dust Attack mean?

An offline attack that recovers the WPS PIN of a vulnerable access point in seconds by exploiting weak nonces in the WPS registration protocol.

How does Pixie Dust Attack work?

The Pixie Dust attack was published in 2014 by Dominique Bongard. He observed that many access points use predictable or zero pseudo-random number generators for the E-S1 and E-S2 nonces in the WPS M3 message. Because the access point reveals the hashes E-Hash1 and E-Hash2 in M3 before the client commits, an attacker can capture a single M1-M3 exchange and brute-force the PIN halves entirely offline in seconds to minutes. Tools like pixiewps and Reaver's -K mode automate this. Chipsets from Ralink, Broadcom, Realtek and MediaTek were widely affected. The fix is to disable WPS or upgrade firmware that uses a strong PRNG.

How do you defend against Pixie Dust Attack?

Defences for Pixie Dust Attack typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Pixie Dust Attack?

Common alternative names include: pixiewps, Offline WPS attack.

Related terms