WPS Cracker


reaver -i -b -vv


Reaver implements a brute force attack against WiFi Protected Setup which can crack the WPS pin of an access point in a matter of hours and subsequently recover the WPA/WPA2 passphrase. Specifically, Reaver targets the registrar functionality of WPS, which is flawed in that it only takes 11,000 attempts to guess the correct WPS pin in order to become a WPS registrar. Once registred as a regis‐ trar with the access point, the access point will give you the WPA passphrase.


-m, --mac= MAC of the host system (should be resolved automatically) -e, --essid= ESSID of the target AP. Unless cloaked, this will be re‐ solved automatically. -c, --channel= Set the 802.11 channel for the interface (implies -f) -o, --out-file= Send output to a log file [default: stdout] -f, --fixed Disable channel hopping -5, --5ghz Use 5GHz 802.11 channels -v, --verbose Display non-critical warnings (-vv for more) -q, --quiet Only display critical messages -i, --interface= Name of the monitor-mode interface to use -b, --bssid= BSSID of the target AP -p, --pin= Use the specified WPS pin -h, --help Show help


This manual page was written by Craig Heffner , Tactical Network Solutions. Permission is granted to copy, dis‐ tribute and/or modify this document under the terms of the GNU Gen‐ eral Public License, Version 2 or any later version published by the Free Software Foundation, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL.

Copied to clipboard
free 100$ digital ocean credit