Brute force attack against Wifi Protected Setup
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
Refresh
Refresh
Source Files
Filename | Size | Changed | Actions |
---|---|---|---|
reaver-1.4.tar.gz | 0000766603 749 KB | over 11 years | |
reaver.changes | 0000000153 153 Bytes | over 10 years | |
reaver.spec | 0000002616 2.55 KB | over 10 years |
Latest Revision
Stefan Botter (jsjhb)
accepted
request 835
over 10 years ago
(revision 1)
A WPS brute force attack tool
Comments for reaver 0