EN
ENNA

Reaver

๐Ÿ“ก Wireless ยท C

Reaver implements a brute force attack against Wi-Fi Protected Setup (WPS) registrar PINs to recover WPA/WPA2 passphrases. WPS uses an 8-digit PIN where the last digit is a checksum and the first and second halves are validated separately, reducing the effective keyspace from 100 million to about 11,000 possibilities. Reaver systematically tries PIN combinations against the target access point, typically recovering the passphrase within 4-10 hours depending on the target. It includes features like automatic detection of WPS-enabled access points, session saving and restoring for interrupted attacks, and configurable timing and delay options to handle rate limiting and lockout mechanisms. Reaver is often used alongside Pixiewps for the more efficient Pixie Dust attack against vulnerable WPS implementations that leak enough information to recover the PIN offline in seconds.

1.9kstars
449forks
23issues
Updated 5mo ago

Installation

apt (Debian/Ubuntu)

$ sudo apt install reaver

from source

$ git clone https://github.com/t6x/reaver-wps-fork-t6x.git && cd reaver-wps-fork-t6x/src && ./configure && make && sudo make install

Use Cases

  • Testing WPS-enabled routers for PIN brute force vulnerabilities
  • Recovering WPA/WPA2 passphrases through WPS PIN exploitation
  • Auditing wireless networks for WPS misconfiguration and weak implementations
  • Combining with Pixiewps for rapid Pixie Dust attacks against vulnerable APs

Tags

wpswifibrute-forcewpawpa2wireless-audit

More in Wireless