Using Bully Command (with examples)

Using Bully Command (with examples)

1: Crack the password

bully --bssid "<mac>" --channel "<channel>" --bruteforce "<interface>"

Motivation: The bully command is used to brute-force the WPS (Wi-Fi Protected Setup) pin of a wireless access point. This can be helpful in situations where the user has forgotten the password of their Wi-Fi network and wants to regain access.

Explanation for the arguments:

  • --bssid "<mac>": Specifies the MAC address of the target wireless access point.
  • --channel "<channel>": Specifies the channel on which the target access point is operating.
  • --bruteforce "<interface>": Specifies the interface to be used for brute-forcing the WPS pin.

Example output:

[*] Bully v1.0-22-g8e57a28 (C) 2014 Joshua Wright and Damien Storhjor
[*] initializing session
[*] interface is set to: <interface>
[*] setting our MAC address to random
[*] setting transport channel to 1
[+] waiting for beacon from target access point
[*] got beacon, setting to channel <channel>
[+] beginning brute force session
[*] initiating WPS handshake
[*] starting open registrar brute force
[+] registrar found: <MAC>:<PIN>
[+] WPS PIN: <PIN> is correct
[+] successfully obtained WPA passphrase: <passphrase>
[+] Session saved as "/root/.bully/output.bin"
... (additional output)

2: Display help

bully --help

Motivation: The --help option provides a detailed explanation of how to use the bully command and its various options. This can be useful for new users who are unfamiliar with the command and want to understand its functionality and usage.

Example output:

bully v1.0-22-g8e57a28 (C) 2014 Joshua Wright and Damien Storhjor
usage: bully [options]

Required options:
  --bssid mac               set the MAC address of the target access point
  --channel n               set the channel of the target AP

Attack options:
  --bruteforce iface        begin the brute force attack on the target AP
  --bully-wps               actively bully a target AP

  ... (additional output)

By using these examples, users can effectively utilize the bully command for brute-forcing the WPS pin of a wireless access point and understanding its usage through the help option.

Related Posts

How to use the command "!" (with examples)

How to use the command "!" (with examples)

The exclamation mark, or “!” command, is a bash builtin that allows you to substitute a command with a previous command found in your command history.

Read More
How to use the command "fprintd-list" (with examples)

How to use the command "fprintd-list" (with examples)

The command “fprintd-list” is used to list enrolled fingerprints for specific users.

Read More
How to use the command 'btrbk' (with examples)

How to use the command 'btrbk' (with examples)

The ‘btrbk’ command is a tool that allows users to create snapshots and remote backups of btrfs subvolumes.

Read More