Last digit = checksum → 7 real digits
Protocol validates the first and second half separately
➡️ Effective complexity is 10⁴ + 10³ = 11,000 combinations
→ Much weaker than WPA/WPA2 password strength.
Extremely dangerous when the AP leaks required info.
Uses intercepted WPS EAP exchanges:
EAP-M1, M2, M3, M4...
Leaked nonces + HMAC-SHA256 data
→ Allows cracking the WPS PIN in minutes without brute forcing AP directly.
Tools: pixiewps, reaver with Pixie Dust attack, etc.