Introduction

Reaver is an open-source tool for performing brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. This tool has been designed to be a robust and practical and has been tested against a wide variety of access points and WPS implementations.

Wifi Protected Setup (WPS)

Download this app from Microsoft Store for Windows 10 Mobile, Windows Phone 8.1, Windows Phone 8. See screenshots, read the latest customer reviews, and compare ratings for WPS App. Reaver Pro ISO 2016 Wifi Hack is often exploited to brute force the WPS PIN, and enable recovery of the WPA password within an incredibly short duration of time, instead of the typical attack on WPA. In the case of commercial use please take a look at the product licenses, from the app point of view commercial use is also free. Google; About Google; Privacy; Terms. Reaver Software Jan 03, 2018 Reaver download below, this tool has been designed to be a robust and practical tool to hack WPS Pin WiFi Networks using WiFi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. It has been tested against a wide variety of access points and WPS implementations. Reaver-wps brute forces the first half of the pin and then the second half of the pin, meaning that the entire key space for the WPS pin number can be exhausted in 11,000 attempts. The speed at which Reaver can test pin numbers is entirely limited by the speed at which the AP can process WPS requests.

Reaver Package Description. Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in this paper. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered.

Wi-Fi Protected Setup is an optional certification program from the Wi-Fi Alliance that is designed to ease the task of setting up and configuring security on wireless local area networks. Wi-Fi Protected Setup enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to automatically configure new wireless networks, add new devices and enable security. (Brute forcing Wi-Fi Protected Setup – When poor design meets poor implementation by Stefan Viehbck).

Reaver: Brute force attack against WiFi Protected Setup

The original Reaver performs a brute force attack against the AP, attempting every possible combination in order to guess the AP’s 8 digit pin number. Depending on the target’s Access Point (AP), Reaver will recover the AP’s plain text WPA / WPA2 passphrase in 4-10 hours, on average. But If you are using offline attack and the AP is vulnerable, it may take only a few seconds/minutes.

The first version of reaver-wps (reaver 1.0) was created by Craig Heffner in 2011.

You can find the original Reaver, version 1.0 to 1.4, in google code archives. From version 1.4, reaver-wps comes with a simple and fast WPS scanner – wash.

Supported wireless drivers:

  • ath9k, rtl8187, carl19170, ipw2000, rt2800pci, rt73usb
  • partially supported: ath5k, iwlagn, rtl2800usb, b43

reaver-wps-fork-t6x

Reaver-wps-fork-t6x version 1.6.x is a community forked version of the original Reaver, which includes various bug fixes, new features and additional attack method – offline Pixie Dust attack. Since this fork supports Pixie Dust attack, you’ll be able to preform it against modern routers.

Features:

  • Support for the offline Pixie Dust attack.
  • Improved argument -p with an Arbitrary String (-p, --pin=<wps pin> )
  • New wash: Compatibility with all supported WiFi chips, wash now displays the correct signal level with all the (supported) WiFi chips.
  • Power to the user with the pipe compatibility: You can now modify “on the fly” wash’s stdout with pipe compatibility.

Requirements

Build-time dependencies:

  • libpcap-dev
  • build-essential

Runtime-time dependencies:

  • pixiewps (optional, required for Pixie Dust attack)
  • aircrack-ng (optional, though recommended)

To install dependencies, run the following:

Note: In order to perform Pixie Dust attack, you need to have Wiire’s Pixiewps installed.

Install

Reaver-wps comes preinstalled in Kali Linux & BlackArch Linux. It can be installed on any other Linux via source code.

First of all, clone it from the github:

or download:

Then locate the shell:

and compile:

Now you can install it with the following:

Basic Reaver Usage

Use -h to list available options:

New Options/Features:

  • -K or -Z // --pixie-dust: perform the offline attack, Pixie Dust (pixiewps), by automatically passing the PKE, PKR, E-Hash1, E-Hash2, E-Nonce and Authkey variables.
  • -p with arbitrary string // --pin=: can be used against Access Points that do not follow the WPS checksum on the last digit of the PIN.
Important: If you are attacking a Realtek AP, do NOT use small DH Keys (-S) option. User will have to execute Reaver with the cracked PIN (option -p) to get the WPA pass-phrase.

Example:

To use reaver you’ll only need the interface name and the BSSID of the target AP. https://ameblo.jp/backrawasa1979/entry-12632358989.html. If you want to get more detailed information about the attack as it progresses, run the reaver in the verbose mode.

Basic Wash Usage

You can also type -h to list all available wash options:

New Options/Features:

  • -a // --all: this option will list all access points, including those without WPS enabled.
  • -j // --json: the extended WPS information (serial, model…) from the AP probe answer will be printed in the terminal (in json format).

Example:

To scan for networks you can use option --scan, just run: Rvox vst free download.

Many tools have been out there for network penetration testing, pentesting or hacking…many ways of seeing this.anyways one tool that has been updated not to long ago is REAVER 1.4
Reaver focuses in WPA/WPA2 using BruteForce Attack not the famous Dictionary/Wordlist attack. Though many tools work BUT are very time consuming, taking forever. Reaver performs a brute force attack against the AP, attempting every possible combination in order to guess the AP’s 8 digit pin number. Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible values for any given pin

The key space is reduced even further due to the fact that the WPS authentication protocol cuts the pin in half and validates each half individually. That means that there are 10^4 (10,000) possible values for the first half of the pin and 10^3 (1,000) possible values for the second half of the pin, with the last digit of the pin being a checksum.

My personal experience with Reaver the first time I used it was a bit frustrating because unlike others I’ve heard about that takes them about 2-3 hours, even a case that i saw in Youtube about this guy cracking the PIN in an instant,very first attempt (5 seconds to be exact)…PIN happened to be 12345670 which happens to be the first PIN it tries…but it can happen and it did…as for me, it took me 60 hours NON-stop 2 1/2 days.but.Reaver did its job.the good thing is that you can pause your session by using pushing CTRL + C….(NOTE: if running from live cd or USB it will NOT save if you turn off the computer)

So lets move on to the commands…if you don’t have Backtrack 5R2 you will have to upgrade or simply download and install it.super easy.Backtrack 5 R2 has Reaver 1.4 already, so no worries.

Reaver Download Windows 10

airmon-ng

then place your interface into monitor mode by typing

airmon-ng startwlanX

Scan for AP’s

wash -i mon0

add -C at the end if you get some kind of error.

Press CTRL+C to stop the scan, copy the Target BSSID

now for the attack I used the following:

reaver -i mon0 -a -c 6 -b 00:11:22:33:44:55 -vv

Download Reaver For Windows

As you may already know that different commands can be given.each may work better for one than it did for another. The command I normally use is as follows.do be aware that by giving this command you run the risk of getting locked out. Not all Access Points like this.it will speed up the cracking process but you run that lockout risk so here it goes

reaver -i mon0 -f -c 6 -a -b 00:11:22:33:44:55 -v -d 0 -S

After -c just put the channel of the AP and after -b just put the bssid of the AP
You will notice the difference in speed.

And the final step is to sit and wait for reaver to do it’s magic…
This article is something basic.but there are some out there that are different but just a small addition to either of the commands.

So please comment if you have any questions and comment about your experience with Reaver.

Here is something that could happen to you just as is happened to me. Notice in the image below how it shows 4.85% complete and it made a huge leap to 90.93% complete in only 14 seconds. The reason for this is as fallows, as Reaver was trying to crack the PIN by Bruteforce the first half of the PIN was changing and suddenly the first 4 numbers are not moving anymore, only the last 4, the second half. What happened here is that it cracked the first half of the PIN and I was only about 7 minutes into the session. So 7 mins. to crack the first half is pretty good. Notice the first 4 PIN numbers are 0524 and from there it only tried the other half which is cut the time it would take Reaver to crack the PIN in more than half the time.

As you can see above, it took Reaver about 2 hours to acquire the PIN along with the PSK (PreSharedKey)…

I would like to invite all readers to check out my other posts that are of great help for those that want to learn how Network Penetration Testing…It touches the basics and are are rich in facts. Find out which WIFI adapters work good and which ones are NO good for packet injection. All adapters metioned have been tested by me. (LINK WILL BE POSTED LATER)

July 2, 2012 UPDATE: Ok, so as I continued to test and play around with Reaver I found out first hand that using the -L command might give you a hard time down the road. What happens is that it gets stuck at 90.90% trying out the same PIN for a very long time.

Download Reaver-wps

I saw this happening and has been mostly reported in Belkin routers
(Source:http://code.google.com/p/reaver-wps/)
Some say that by removing the -L command will cause Reaver to continue trying pins but, I personally had no luck by removing the -L command.so heads up, don’t be shocked or surprised when and if this happens to you.

Download Reaver Pro For Windows

July 9,2012 UPDATE: Ok to those that want Reaver PRO ISO. I managed to get my hands on a copy and now I will share it with everyone. Just make a bootable USB or disc but, a USB is recommended because it’s faster than the live disc. DOWNLOAD REAVER PRO HERE

July 12, 2012 UPDATE: A few days back I placed an order for a Kasens 680WN 36 dbi adapter 3070 Ralink chipset…Many Reaver users claimed it did not work…curious about it I went ahead and tested it myself and my results are different. 3070 chipset 100% working using Xiaopan OS…reason why it would not work for others is most likely the AP is too far from them…and most likely if it’s too far from them it is not their own…which comes to this conclusion “cracking some else’s AP is ILLEGAL”

UPDATE:

Here is the link to a super cool tool called WEPWAP 1.5
I would like to point out that it only works on a 32 bit and not a 64bit.download it, you will love it.