Reaver is an open source tool for exploiting weaknesses in Wi-Fi Protected Setup (WPS) registrar PINs, recovering WPA/WPA2 passphrases and resetting access point settings to factory defaults.
Reaver is an open source penetration testing tool used to exploit flaws in Wi-Fi Protected Setup (WPS) systems. It is designed to brute force the WPS PIN and recover the WPA/WPA2 passphrase for the wireless network.
Reaver works by exploiting a flaw in the WPS protocol that allows attackers to brute force the WPS PIN in order to retrieve the network's passphrase. This vulnerability exists because WPS allows unlimited PIN attempts for validating clients.
By repeatedly guessing PINs, Reaver can eventually guess the correct one and gain access to the network. Once the correct PIN has been discovered, Reaver can recover the WPA/WPA2 passphrase and return the access point settings to factory defaults.
Reaver has several options for configuring timing attacks to optimize the brute force process. It can work on many access points and routers that have WPS enabled. It runs on Linux and requires a wireless network adapter that supports raw packet injection.
While useful for penetration testers and security researchers, Reaver poses privacy and security risks in the hands of malicious attackers. It allows attackers to gain unauthorized access to wireless networks. Therefore, it is not recommended for most users.
Here are some alternatives to Reaver:
Suggest an alternative ❐