reaver-wps-fork-t6x v1.6.5 released: new way to crack WPS
Reaver has been designed to be a robust and practical attack against Wi-Fi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. It has been tested against a wide variety of access points and WPS implementations.
reaver-wps-fork-t6x version 1.6b is a community forked version, which has included various bug fixes and additional attack method (the offline Pixie Dust attack).
Depending on the target’s Access Point (AP), to recover the plaintext WPA/WPA2 passphrase the average amount of time for the transitional online brute force method is between 4-10 hours. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. When using the offline attack, if the AP is vulnerable, it may take only a matter of seconds to minutes.
- remove -D/–daemonize command line option
- Detect Lantiq/MetaLink chipset
- bring back –ignore-fcs options, this time for both reaver and wash
- wash: make it possible to select both 2.4 and 5 ghz band
- remove option -o (–out-file)
- wash: send all output other than AP rows to stderr
- wash: fix usage with pcap sans radiotap header
- add option -U/–utf8 to opt out of ESSID sanitization
- fix logical bug in endianness.h causing big endian breakage
- Pass on pixiewps exit code.
- wash: double the amount of maximal APs to 512
How to use, please visit here.