EN
ENNA

Reaver vs Wifite2

GitHub Stats

1.9k
Stars
7.7k
449
Forks
1.6k
23
Issues
343
5mo ago
Updated
1y ago
-
License
GPL-2.0
C
Language
Python

About Reaver

Reaver implements a brute force attack against Wi-Fi Protected Setup (WPS) registrar PINs to recover WPA/WPA2 passphrases. WPS uses an 8-digit PIN where the last digit is a checksum and the first and second halves are validated separately, reducing the effective keyspace from 100 million to about 11,000 possibilities. Reaver systematically tries PIN combinations against the target access point, typically recovering the passphrase within 4-10 hours depending on the target. It includes features like automatic detection of WPS-enabled access points, session saving and restoring for interrupted attacks, and configurable timing and delay options to handle rate limiting and lockout mechanisms. Reaver is often used alongside Pixiewps for the more efficient Pixie Dust attack against vulnerable WPS implementations that leak enough information to recover the PIN offline in seconds.

About Wifite2

Wifite2 automates the process of auditing wireless networks by wrapping popular tools like aircrack-ng, reaver, and hashcat. It simplifies WiFi security testing, supporting attacks on WPA and WPS protocols. Written in Python, Wifite2 is user-friendly and effective for both penetration testers and security enthusiasts. Its ability to streamline complex wireless attacks makes it a favored tool for comprehensive WiFi auditing.

Platform Support

🐧linux
🐧linux

Tags

Shared

wpswifiwpa

Reaver only

brute-forcewpa2wireless-audit

Wifite2 only

automated