Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Reaver"

From NetSec
Jump to: navigation, search
Line 1: Line 1:
'''Reaver''' is a brute forcing WPS destroyer. Utilizing a security flaw in wireless security which was only revealed in 2011, Reaver systematically works its way through 10,000 feasible PIN numbers and as most wireless routers have this enabled by default, it proves to be a most successful wireless penetration tool. If you want a history lesson regarding Reaver, go google it. Here is how we use it.
+
'''Reaver''' is a WPS brute forcing utility for [[Linux]] that exploits a [[Design Flaws|feature-flaw]] in [[wireless]] access points that have the quick-setup [[hardware]] button (WPS) for "easy setup", allowing an attacker to retrieve a WPA or WPA2 key.
 
+
First up, this relies on you having a linux box, a wireless card that supports packet injection and the aircrack-ng tool suite installed. If you're still on a windows system I'd suggest getting linux asap. These days it's a piece of cake to make a live usb and with distros like ubuntu the transition from windows isn't a big deal.
+
  
 
*[http://code.google.com/p/reaver-wps/wiki/README Reaver installation]
 
*[http://code.google.com/p/reaver-wps/wiki/README Reaver installation]

Revision as of 01:33, 8 August 2012

Reaver is a WPS brute forcing utility for Linux that exploits a feature-flaw in wireless access points that have the quick-setup hardware button (WPS) for "easy setup", allowing an attacker to retrieve a WPA or WPA2 key.

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.
This article was written using inappropriate person, but has otherwise good content. Please forgive (but preferrably correct) uses of I, we, us, you, etc.