Tuesday 4 June 2013

HACKING WPA & WPA2 KEY WITH REAVER (NO DICTIONARY - WORDLIST)


HACKING WPA & WPA2 KEY WITH REAVER (NO DICTIONARY - WORDLIST)


Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://adf.ly/Q210f

Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase

VIDEO TUTORIAL: http://adf.ly/Q1zwl

TEXT TUTORIAL: http://adf.ly/Q20V5

No comments:

Post a Comment