Reaver – Brute Force WPS

Reaver – Brute Force WPS

Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases.

Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.

On average Reaver will recover the target AP’s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.

  • Author: Tactical Network Solutions, Craig Heffner
  • License: GPLv2

Source: GoogleCode



Add a Comment

Your email address will not be published. Required fields are marked *