The standard emphasizes usability and security, and allows four modes in a home network for adding a new device to the network:
The last two modes are usually referred to as out-of-band methods as there is a transfer of information by a channel other than the Wi-Fi channel itself. Only the first two modes are currently[when?] covered by the WPS certification. The USB method has been deprecated and is not part of the Alliance's certification testing.
Some wireless access points have a dual-function WPS button, and holding this button down for a shorter or longer time may have other functions, such as factory-reset or toggling WiFi.10 [additional citation(s) needed]
Some manufacturers, such as Netgear, use a different logo and/or name for Wi-Fi Protected Setup;11 the Wi-Fi Alliance recommends the use of the Wi-Fi Protected Setup Identifier Mark on the hardware button for this function.12
The WPS protocol defines three types of devices in a network:
The WPS standard defines three basic scenarios that involve components listed above:
The WPS protocol consists of a series of EAP message exchanges that are triggered by a user action, relying on an exchange of descriptive information that should precede that user's action. The descriptive information is transferred through a new Information Element (IE) that is added to the beacon, probe response, and optionally to the probe request and association request/response messages. Other than purely informative type–length–values, those IEs will also hold the possible and the currently deployed configuration methods of the device.
After this communication of the device capabilities from both ends, the user initiates the actual protocol session. The session consists of eight messages that are followed, in the case of a successful session, by a message to indicate that the protocol is completed. The exact stream of messages may change when configuring different kinds of devices (AP or STA), or when using different physical media (wired or wireless).
Some devices with dual-band wireless network connectivity do not allow the user to select the 2.4 GHz or 5 GHz band (or even a particular radio or SSID) when using Wi-Fi Protected Setup, unless the wireless access point has separate WPS button for each band or radio; however, a number of later wireless routers with multiple frequency bands and/or radios allow the establishment of a WPS session for a specific band and/or radio for connection with clients which cannot have the SSID or band (e.g., 2.4/5 GHz) explicitly selected by the user on the client for connection with WPS (e.g. pushing the 5 GHz, where supported, WPS button on the wireless router will force a client device to connect via WPS on only the 5 GHz band after a WPS session has been established by the client device which cannot explicitly allow the selection of wireless network and/or band for the WPS connection method).1415
In December 2011, researcher Stefan Viehböck reported a design and implementation flaw that makes brute-force attacks against PIN-based WPS feasible to be performed on WPS-enabled Wi-Fi networks. A successful attack on WPS allows unauthorized parties to gain access to the network, and the only effective workaround is to disable WPS.16 The vulnerability centers around the acknowledgement messages sent between the registrar and enrollee when attempting to validate a PIN, which is an eight-digit number used to add new WPA enrollees to the network. Since the last digit is a checksum of the previous digits,17 there are seven unknown digits in each PIN, yielding 107 = 10,000,000 possible combinations.
When an enrollee attempts to gain access using a PIN, the registrar reports the validity of the first and second halves of the PIN separately. Since the first half of the pin consists of four digits (10,000 possibilities) and the second half has only three active digits (1000 possibilities), at most 11,000 guesses are needed before the PIN is recovered. This is a reduction by three orders of magnitude from the number of PINs that would be required to be tested. As a result, an attack can be completed in under four hours. The ease or difficulty of exploiting this flaw is implementation-dependent, as Wi-Fi router manufacturers could defend against such attacks by slowing or disabling the WPS feature after several failed PIN validation attempts.18
A young software developer based out of a small town in eastern New Mexico created a tool that exploits this vulnerability to prove that the attack is feasible.1920 The tool was then purchased by Tactical Network Solutions in Maryland. They state that they have known about the vulnerability since early 2011 and had been using it.21
In some devices, disabling WPS in the user interface does not result in the feature actually being disabled, and the device remains vulnerable to this attack.22 Firmware updates have been released for some of these devices allowing WPS to be disabled completely. Vendors could also patch the vulnerability by adding a lock-down period if the Wi-Fi access point detects a brute-force attack in progress, which disables the PIN method for long enough to make the attack impractical.23
In the summer of 2014, Dominique Bongard discovered what he called the Pixie Dust attack. This attack works only on the default WPS implementation of several wireless chip makers, including Ralink, MediaTek, Realtek and Broadcom. The attack focuses on a lack of randomization when generating the E-S1 and E-S2 "secret" nonces. Knowing these two nonces, the PIN can be recovered within a couple of minutes. A tool called pixiewps has been developed24 and a new version of Reaver has been developed to automate the process.25
Since both the client and access point (enrollee and registrar, respectively) need to prove they know the PIN to make sure the client is not connecting to a rogue access point, the attacker already has two hashes that contain each half of the PIN, and all they need is to brute-force the actual PIN. The access point sends two hashes, E-Hash1 and E-Hash2, to the client, proving that it also knows the PIN. E-Hash1 and E-Hash2 are hashes of (E-S1 | PSK1 | PKe | PKr) and (E-S2 | PSK2 | PKe | PKr), respectively. The hashing function is HMAC-SHA-256 and uses the "authkey" that is the key used to hash the data.
All WPS methods are vulnerable to usage by an unauthorized user if the wireless access point is not kept in a secure area.262728 Many wireless access points have security information (if it is factory-secured) and the WPS PIN printed on them; this PIN is also often found in the configuration menus of the wireless access point. If this PIN cannot be changed or disabled, the only remedy is to get a firmware update to enable the PIN to be changed, or to replace the wireless access point.
It is possible to extract a wireless passphrase with the following methods using no special tools:29
"WPS Full Form". GeeksforGeeks. 2020-06-15. Retrieved 2025-05-02. https://www.geeksforgeeks.org/wps-full-form/ ↩
"Where is the WPS Pin located on my hp printer?". Optimum Tech Help. 2023-01-19. Retrieved 2023-07-12. https://www.optimumtechhelp.com/where-is-the-wps-pin-located-on-hp-printer/ ↩
Higgins, Tim (13 March 2008). "How is WPS supposed to work?". SmallNetBuilder. Retrieved 2020-05-01. https://www.smallnetbuilder.com/wireless/wireless-features/30345-how-is-wps-supposed-to-work ↩
"Wi-Fi Protected Setup (WPS) Vulnerable to Brute-Force Attack | CISA". www.cisa.gov. 2013-01-23. Retrieved 2025-04-28. https://www.cisa.gov/news-events/alerts/2012/01/06/wi-fi-protected-setup-wps-vulnerable-brute-force-attack ↩
Viehböck, Stefan (2011-12-26). "Brute forcing Wi-Fi Protected Setup" (PDF). Archived (PDF) from the original on 2012-01-18. Retrieved 2011-12-30. http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf ↩
Allar, Jared (2011-12-27). "Vulnerability Note VU#723755 - WiFi Protected Setup PIN brute force vulnerability". Vulnerability Notes Database. US CERT. Archived from the original on 2017-12-07. Retrieved 2011-12-31. http://www.kb.cert.org/vuls/id/723755 ↩
Gallagher, Sean (2012-01-04). "Hands-on: hacking WiFi Protected Setup with Reaver". Condé Nast Digital. Archived from the original on 2012-01-23. Retrieved 2012-01-20. https://arstechnica.com/business/news/2012/01/hands-on-hacking-wifi-protected-setup-with-reaver.ars ↩
P2P Spec 1.2, clause 3.1.4.3 ↩
P2P Spec 1.2, ↩
[1] Archived 2016-02-03 at the Wayback Machine Tenda W311R+ product page: long press causes factory reset. Retrieved 18 January 2016; Draytek: Vigor 2820 Series manual: short press toggles WiFi http://www.tendacn.com/en/product/W311R+.html ↩
"Netgear N600 Wireless Dual Band Gigabit ADS2+ Modem Router DGND3700 User Manual" (PDF). www.netgear.com. Archived (PDF) from the original on April 4, 2015. Retrieved January 16, 2016. http://www.downloads.netgear.com/files/GDC/DGND3700/DGND3700_UM_11May11.pdf ↩
"Wi-Fi Alliance Brand Style Guide 2014" (PDF). www.wi-fi.org. Wi-Fi Alliance. April 2014. Archived from the original (PDF) on January 17, 2016. Retrieved January 16, 2016. https://web.archive.org/web/20160117000812/http://www.wi-fi.org/download.php?file=%2Fsites%2Fdefault%2Ffiles%2Fprivate%2FWi-Fi_Alliance_Brand_Styleguide-201404.pdf ↩
"Wireless configuration using the PIN Method of Wi-Fi Protected Setup (For HL2170W)". www.uvm.edu. Retrieved 2025-05-02. https://www.uvm.edu/cosmolab/om/brother/html/nug/chapter7.html ↩
[2] "D-Link DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router User Manual, Version 1.0", Page 11, Retrieved 26 January 2016. http://files.dlink.com.au/products/DSL-2544N/Manuals/DSL-2544N_T1_Manual_v1.00%28AU%29.pdf ↩
NetComm NF8AC User Guide, Page 11, http://media.netcomm.com.au/public/assets/pdf_file/0004/142384/NF8AC-User-Guide.pdf Archived 2016-09-28 at the Wayback Machine, Retrieved October 16, 2016. http://media.netcomm.com.au/public/assets/pdf_file/0004/142384/NF8AC-User-Guide.pdf ↩
"Windows Connect Now–NET (WCN-NET) Specifications". Microsoft Corporation. 2006-12-08. Archived from the original on 2012-01-13. Retrieved 2011-12-30. http://download.microsoft.com/download/a/f/7/af7777e5-7dcd-4800-8a0a-b18336565f5b/WCN-Netspec.doc ↩
"reaver-wps". Archived from the original on 2012-01-02. Retrieved 2011-12-30. https://code.google.com/p/reaver-wps/ ↩
"Reaver demonstration on WPS - proof of concept". Archived from the original on 2018-04-15. Retrieved 2015-02-14. http://www.kalitutorials.net/2014/04/hack-wpawpa2-wps-reaver-kali-linux.html ↩
Dennis Fisher (2011-12-29). "Attack Tool Released for WPS PIN Vulnerability". Archived from the original on 2013-03-10. Retrieved 2011-12-31. This is a capability that we at TNS have been testing, perfecting and using for nearly a year. https://web.archive.org/web/20130310135915/https://threatpost.com/en_us/blogs/attack-tool-released-wps-pin-vulnerability-122911 ↩
Slavin, Brad (January 18, 2013). "Wi-Fi Security – The Rise and Fall of WPS". Netstumbler.com. Archived from the original on December 19, 2013. Retrieved December 17, 2013. http://www.netstumbler.com/2013/01/18/wi-fi-security-the-rise-and-fall-of-wps/ ↩
"pixiewps". GitHub. Archived from the original on 2015-08-04. Retrieved 2015-05-05. https://github.com/wiire/pixiewps ↩
"Modified Reaver". GitHub. Archived from the original on 2015-08-03. Retrieved 2015-05-05. https://github.com/t6x/reaver-wps-fork-t6x ↩
Scheck, Steven (2014-09-04). "WPS – Advantages and Vulnerability". ComputerHowtoGuide. Archived from the original on 2023-07-12. Retrieved 2023-07-12. https://www.computerhowtoguide.com/wps-advantages-vulnerability/ ↩
Hoffman, Chris (2017-07-10). "Wi-FI Protected Setup (WPS) is Insecure: Here's Why You Should Disable It". How-To Geek. Archived from the original on 2023-07-12. Retrieved 2023-07-12. https://www.howtogeek.com/176124/wi-fi-protected-setup-wps-is-insecure-heres-why-you-should-disable-it/ ↩
Tomáš Rosa, Wi-Fi Protected Setup: Friend or Foe Archived 2016-12-25 at the Wayback Machine, Smart Cards & Devices Forum, May 23, 2013, Prague, Retrieved October 16, 2016. http://crypto.hyperlink.cz/files/rosa_scadforum13.pdf ↩
"An Emphasis On Physical Security For Wireless Networks", Bryce Cherry on Youtube, 8 April 2013, archived from the original on 2016-09-11, retrieved 2023-07-12 https://www.youtube.com/watch?v=kRhyvRAUG6k ↩