reaver-wps-fork-t6x: New way to break WPS!

Reaver is designed to be a powerful and practical against Wi-Fi registrar PINs Setup (WPS) in order to recover them WPA / WPA2 passphrases. It has been tested on a wide variety of WPS access points and applications.

Reaver-wps-fork-t6x version 1.6b is a forked version of the Reaver community, which includes various bug fixes and an additional attack method (Attack Pixie Dust offline).

Depending on the target Access Point (AP) for retrieving the WPA / WPA2 plain text access phrase, the average time for the brute force transition method is between 4-10 hours. In practice, it will usually take half a year to guess what is right and retrieve the access passphrase. When using the offline attack, if the AP is vulnerable, it may only take a few seconds to a few minutes to break.

Specifications

  • Improved bruteforce function using .wpc files
  • Automatic recovery of pixiewps pins and live injection in the current session if the pin is broken before the time limit expires
  • Experimental command line uptime switch –u
  • Many bug fixes and improvements

Installation

apt-get -y install build-essential libpcap-dev aircrack-ng pixiewps git clone https://github.com/t6x/reaver-wps-fork-t6x cd reaver-wps-fork-t6x * / cd src /. / configure make sudo make install

Use


Snapshots ς

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).