reaver-wps-fork-t6x v1.6.6 released: new way to crack WPS

reaver

Reaver has been designed to be a robust and practical attack against Wi-Fi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. It has been tested against a wide variety of access points and WPS implementations.

reaver-wps-fork-t6x version 1.6b is a community forked version, which has included various bug fixes and additional attack method (the offline Pixie Dust attack).

Depending on the target’s Access Point (AP), to recover the plaintext WPA/WPA2 passphrase the average amount of time for the transitional online brute force method is between 4-10 hours. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. When using the offline attackif the AP is vulnerable, it may take only a matter of seconds to minutes.

Changelog v1.6.6

several improvements have been made:

  • improved bruteforce mode using .wpc save files.
  • automatic pixiewps pin retrieval and live injection in current session if pin is cracked before the timeout happens,
  • experimental uptime command line switch -u
  • lots of bugfixes and improvements

Installation

apt-get -y install build-essential libpcap-dev aircrack-ng pixiewps

git clone https://github.com/t6x/reaver-wps-fork-t6x
cd reaver-wps-fork-t6x*/
cd src/
./configure
make
sudo make install

 

 

Usage

How to use, please visit here.

Source: https://github.com/t6x/