.:: Introduction  ::.

Speedpwn is an experimental active Bruteforce-Programm for WPA Acesspoints.
It provides an PoC of the weakness in Telekom/Arcadyan default passwords and
a simple wordlist attack.

This package also provide a script to generate a list for an specific Telekom/Arcadyan AccessPoint.

.:: IMPORTANT :.

Experimental means experimental, so don't blame me if your Computer got raped by my code or if 
your acesspoint decided to be hotter than your girlfriend. Note the license anyway. 


.:: Participate ::.

To find more regularities in default passwords we create a wiki-article. 
https://www.wardriving-forum.de/wiki/Standardpassw%C3%B6rter
Feel free to contribute!

.:: Installing ::.

    Requierements:
	- OpenSSL development package
	- aircrack-ng Source/osdep 

1. Copy the files in to the aircrack src/ directory
2. Compile the code with gcc -o speedpwn speedpwn.c common.c  osdep/libosdep.a crypto_branch.c -lssl
	FAQ: You have to compile aircrack-suit first to get the libosdep.

3. ./speedpwn

