Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases.
Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
Step 1 :
Step 2 :
To run it. You can run it at any directory.
Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
Step 1 :
sudo apt-get install subversion build-essential libpcap0.8-dev libpcap-dev
sudo -sH
cd /opt
svn checkout http://reaver-wps.googlecode.com/svn/trunk/ reaver
cd /opt/reaver/src
./configure
make
make install
Step 2 :
To run it. You can run it at any directory.
wash -h
reaver -h
0 comments:
Post a Comment