EN
ENNA

Aircrack-ng vs Reaver

GitHub Stats

7.1k
Stars
1.9k
1.3k
Forks
449
449
Issues
23
8mo ago
Updated
5mo ago
GPL-2.0
License
-
C
Language
C

About Aircrack-ng

Aircrack-ng is a complete suite of tools for assessing WiFi network security. It focuses on monitoring (packet capture and export of data to text files), attacking (replay attacks, deauthentication, fake access points), testing (checking WiFi cards and driver capabilities), and cracking (WEP and WPA PSK). All tools are command-line based, allowing heavy scripting and automation. It works primarily with Linux but also supports Windows, macOS, FreeBSD, and others.

About Reaver

Reaver implements a brute force attack against Wi-Fi Protected Setup (WPS) registrar PINs to recover WPA/WPA2 passphrases. WPS uses an 8-digit PIN where the last digit is a checksum and the first and second halves are validated separately, reducing the effective keyspace from 100 million to about 11,000 possibilities. Reaver systematically tries PIN combinations against the target access point, typically recovering the passphrase within 4-10 hours depending on the target. It includes features like automatic detection of WPS-enabled access points, session saving and restoring for interrupted attacks, and configurable timing and delay options to handle rate limiting and lockout mechanisms. Reaver is often used alongside Pixiewps for the more efficient Pixie Dust attack against vulnerable WPS implementations that leak enough information to recover the PIN offline in seconds.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux

Tags

Shared

wifiwpa

Aircrack-ng only

packet-captureclassic

Reaver only

wpsbrute-forcewpa2wireless-audit