LinuxCommandLibrary

reaver

WPS brute-force attack tool for WiFi networks

TLDR

Scan for WPS-enabled access points using wash

$ wash -i [wlan0mon]
copy
Start WPS brute force attack
$ reaver -i [wlan0mon] -b [AA:BB:CC:DD:EE:FF] -c [channel] -vv
copy
Attack with Pixie Dust (offline attack)
$ reaver -i [wlan0mon] -b [AA:BB:CC:DD:EE:FF] -c [channel] -K -vv
copy
Resume a previous session
$ reaver -i [wlan0mon] -b [AA:BB:CC:DD:EE:FF] -s [session_file]
copy
Attack with custom delay between attempts
$ reaver -i [wlan0mon] -b [AA:BB:CC:DD:EE:FF] -d [5] -vv
copy

SYNOPSIS

reaver -i interface -b bssid [-c channel] [-K] [-vv] [options]

DESCRIPTION

reaver performs brute force attacks against Wi-Fi Protected Setup (WPS) to recover WPA/WPA2 passphrases. WPS uses an 8-digit PIN that can be attacked in two halves, reducing the maximum attempts to approximately 11,000 combinations.
The attack exploits a design flaw in WPS where the access point validates the PIN in two stages, allowing an attacker to determine when the first half is correct before attempting the second half.
The Pixie Dust attack (-K) is an offline attack that exploits weak random number generation in certain chipsets (Ralink, Broadcom, Realtek), potentially recovering the PIN in seconds without brute forcing.
The companion tool wash scans for WPS-enabled access points and identifies potential targets, including those vulnerable to Pixie Dust.

PARAMETERS

-i interface

Wireless interface in monitor mode
-b bssid
Target access point MAC address
-c channel
Channel of target access point
-K
Perform Pixie Dust offline attack
-vv
Verbose output (use multiple v for more detail)
-d seconds
Delay between PIN attempts (default: 1)
-l seconds
Lock delay after WPS lock detected (default: 60)
-s file
Save/restore session to/from file
-p pin
Use specified 4 or 8 digit WPS pin
-N
Do not send NACK packets when errors occur
-T seconds
M5/M7 timeout period (default: 0.20)
-t seconds
Receive timeout period (default: 5)

CAVEATS

Authorization required: Only use against networks you own or have explicit written permission to test. Unauthorized access is illegal.
The interface must be in monitor mode before running reaver. Use airmon-ng start wlan0 to enable monitor mode.
Many modern access points implement WPS lockout after failed attempts, significantly slowing attacks. Some may lock out permanently or disable WPS entirely.
Rate limiting and lock detection (-l option) are essential to avoid permanent lockouts. Some access points may require device reboot to clear WPS locks.

HISTORY

Reaver was developed after security researcher Stefan Viehböck published his paper "Brute forcing Wi-Fi Protected Setup" in December 2011, demonstrating the fundamental weakness in WPS design. The tool quickly became a standard component of wireless security testing toolkits. The Pixie Dust attack was added later to exploit implementation flaws in specific chipsets.

SEE ALSO

aircrack-ng(1), wash(1), airmon-ng(8), wifite(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community