Reaver

Jul 20, 2023

Reaver brute force attack against WPS (Wi-Fi Protected Setup)

Reaver implements a brute force attack against WPS Wi-Fi Protected Setup in order to recover WPA/WPA2 passphrases.

Reaver is intended for penetration testing only, and not for unauthorized access to protected computer networks. Reaver exploits the flaws of the WPS design.

The implementation is based on the paper https//sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf



Checkout these related ports:
  • Zyre - Framework for proximity-based peer-to-peer applications
  • Zsync - File transfer program
  • Zmap - Internet scanner
  • Zillion - Distributed computing project
  • Zerotier - Network virtualization everywhere
  • Zebra-server - Z39.50/SR server software
  • Yptransitd - Replacement for nss_ldap
  • Yggdrasil - Experimental end-to-end encrypted self-arranging IPv6 network
  • Yconalyzer - TCP Traffic Analyzer
  • Yazproxy - Powerful general purpose Z39.50/SRW/SRU proxy
  • Yaz - Z39.50/SR client and API library
  • Yaz++ - C++ toolkit for development of Z39.50v3 clients and servers
  • Yate - Yet Another Telephony Engine
  • Yaph - Yet Another Proxy Hunter (proxy scanner)
  • Yami4 - Messaging library for distributed systems