
UpdatedOct 29, 2024
PublishedFeb 23, 2020
Packagecom.wpsapp.wifiwpstester
MD521f70ed7dc88a570286ddcfc00103276
SHA1 (signer)77:9C:D9:C9:50:72:8A:7A:5F:27:A0:AA:FD:D5:16:09:D1:48:94:40
Signed byCN=Android, OU=Android, O=Google Inc., L=Mountain View, ST=California, C=US
Malware scanTRUSTED
Contact[email protected]
Privacy policyView
Description
WPS Dumpper is a tool that enable you to connect to WiFi networks which have WPS protocol enabled.
Hacking is not exepted in all religions - SO WE NOT RESPONSIBLE FOR ANY MISUSE, INTRUSION INTO FOREIGN NETWORKS IS PUNISHABLE BY LAW.
WPS Dumpper is focused on verifying if your router is vulnerable to a default PIN. Many routers that companies install own vulnerabilities in this aspect. With this application you can check if your router is vulnerable or not and act accordingly.
How that's works?
WPS WPA Connect Dumpper has two principale methods to connect:
- Root Method : Supported all android version but should be rooted.
- No Root Method : supports only Android 5 (Lollipop) and up.
For Android 5 (Lollipop) and up:
- If you are not rooted you can use the application to connect, but you cannot show password unless you are rooted.
- If you are rooted will be alerted to choose either Root Method or No Root Method. , you can show the password using both methods
For Android 4.4 and earlier:
- You have to be ROOTED for both connecting and showing password
- If Your are not Rooted , then you cannot use the application
if you already know the WPS PIN you can easly use the app to connect and get the password using your PIN.
=============================
*** Location Permission is required for Wifi Network Scanning By Android***
=============================
NOTICE: Not all networks are vulnerable and that the network appears as such does not guarantee 100% that it is, several companies have updated firmware of their routers to correct the fault.
TRY IT ON YOUR NETWORK AND IF YOU ARE VULNERABLE... REMEDY IT. Turn off WPS and change password for a strong and personalized.
--> those with a green tick are most likely vulnerable, have the WPS protocol enabled and the connection pin is known. It may also be that the router has WPS disabled, but the password is known, in this case it also appears in green and can be connected to the key.
=============================
Some Samsung models use encryption and do not show real passwords, they show a long series of hexadecimal digits.
-- Please understand how the application works before giving an assessment.
WARNING: Beware of copies of this app detected on Google Play, they can be dangerous.
Hacking is not exepted in all religions - SO WE NOT RESPONSIBLE FOR ANY MISUSE, INTRUSION INTO FOREIGN NETWORKS IS PUNISHABLE BY LAW.
WPS Dumpper is focused on verifying if your router is vulnerable to a default PIN. Many routers that companies install own vulnerabilities in this aspect. With this application you can check if your router is vulnerable or not and act accordingly.
How that's works?
WPS WPA Connect Dumpper has two principale methods to connect:
- Root Method : Supported all android version but should be rooted.
- No Root Method : supports only Android 5 (Lollipop) and up.
For Android 5 (Lollipop) and up:
- If you are not rooted you can use the application to connect, but you cannot show password unless you are rooted.
- If you are rooted will be alerted to choose either Root Method or No Root Method. , you can show the password using both methods
For Android 4.4 and earlier:
- You have to be ROOTED for both connecting and showing password
- If Your are not Rooted , then you cannot use the application
if you already know the WPS PIN you can easly use the app to connect and get the password using your PIN.
=============================
*** Location Permission is required for Wifi Network Scanning By Android***
=============================
NOTICE: Not all networks are vulnerable and that the network appears as such does not guarantee 100% that it is, several companies have updated firmware of their routers to correct the fault.
TRY IT ON YOUR NETWORK AND IF YOU ARE VULNERABLE... REMEDY IT. Turn off WPS and change password for a strong and personalized.
--> those with a green tick are most likely vulnerable, have the WPS protocol enabled and the connection pin is known. It may also be that the router has WPS disabled, but the password is known, in this case it also appears in green and can be connected to the key.
=============================
Some Samsung models use encryption and do not show real passwords, they show a long series of hexadecimal digits.
-- Please understand how the application works before giving an assessment.
WARNING: Beware of copies of this app detected on Google Play, they can be dangerous.
Required features
- Faketouch android.hardware.faketouch
- Location android.hardware.location
- Screen Portrait android.hardware.screen.portrait
- Wifi android.hardware.wifi
Permissions (28)
WPS WPA Connect Dumpper requests the following Android permissions:
- Access Coarse Location android.permission.ACCESS_COARSE_LOCATION
- Access Network State android.permission.ACCESS_NETWORK_STATE
- Access Wifi State android.permission.ACCESS_WIFI_STATE
- Change Wifi State android.permission.CHANGE_WIFI_STATE
- Internet android.permission.INTERNET
- Read App Badge android.permission.READ_APP_BADGE
- Read External Storage android.permission.READ_EXTERNAL_STORAGE
- Receive Boot Completed android.permission.RECEIVE_BOOT_COMPLETED
- Vibrate android.permission.VIBRATE
- Wake Lock android.permission.WAKE_LOCK
- Com Anddoes Launcher Permission Update Count com.anddoes.launcher.permission.UPDATE_COUNT
- C2dm Permission Receive com.google.android.c2dm.permission.RECEIVE
- Finsky Permission Bind Get Install Referrer Service com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE
- Com Htc Launcher Permission Read Settings com.htc.launcher.permission.READ_SETTINGS
- Com Htc Launcher Permission Update Shortcut com.htc.launcher.permission.UPDATE_SHORTCUT
- Com Huawei Android Launcher Permission Change Badge com.huawei.android.launcher.permission.CHANGE_BADGE
- Com Huawei Android Launcher Permission Read Settings com.huawei.android.launcher.permission.READ_SETTINGS
- Com Huawei Android Launcher Permission Write Settings com.huawei.android.launcher.permission.WRITE_SETTINGS
- Com Majeur Launcher Permission Update Badge com.majeur.launcher.permission.UPDATE_BADGE
- Com Oppo Launcher Permission Read Settings com.oppo.launcher.permission.READ_SETTINGS
- Com Oppo Launcher Permission Write Settings com.oppo.launcher.permission.WRITE_SETTINGS
- Com Sec Android Provider Badge Permission Read com.sec.android.provider.badge.permission.READ
- Com Sec Android Provider Badge Permission Write com.sec.android.provider.badge.permission.WRITE
- Com Sonyericsson Home Permission Broadcast Badge com.sonyericsson.home.permission.BROADCAST_BADGE
- Com Sonymobile Home Permission Provider Insert Badge com.sonymobile.home.permission.PROVIDER_INSERT_BADGE
- Com Wpsapp Wifiwpstester Permission C2d Message com.wpsapp.wifiwpstester.permission.C2D_MESSAGE
- Me Everything Badger Permission Badge Count Read me.everything.badger.permission.BADGE_COUNT_READ
- Me Everything Badger Permission Badge Count Write me.everything.badger.permission.BADGE_COUNT_WRITE