Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/t6x/reaver-wps-fork-t6x
https://github.com/t6x/reaver-wps-fork-t6x
Last synced: 1 day ago
JSON representation
- Host: GitHub
- URL: https://github.com/t6x/reaver-wps-fork-t6x
- Owner: t6x
- Created: 2015-04-11T16:36:37.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2024-12-12T14:35:48.000Z (about 1 month ago)
- Last Synced: 2025-01-22T21:55:04.918Z (3 days ago)
- Language: C
- Size: 2.18 MB
- Stars: 1,729
- Watchers: 159
- Forks: 412
- Open Issues: 23
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-starts - t6x/reaver-wps-fork-t6x - (others)
- awesome-termux-hacking - reaver-wps-fork-t6x - No description provided[![->](https://img.shields.io/github/stars/t6x/reaver-wps-fork-t6x.svg?style=social&label=Star&maxAge=2592000)](https://github.com/t6x/reaver-wps-fork-t6x/stargazers/) (Uncategorized / Uncategorized)
README
# Overview
**Reaver** implements a **brute force attack** against **Wifi Protected Setup** (WPS) registrar **PINs** in order to recover **WPA/WPA2 passphrases**, as described in [Brute forcing Wi-Fi Protected Setup When poor design meets poor implementation.](http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf) by **Stefan Viehböck**.
**Reaver** has been designed to be a robust and practical attack against **Wi-Fi Protected Setup (WPS)** registrar PINs in order to **recover WPA/WPA2 passphrases** and has been tested against a wide variety of access points and WPS implementations.
**Depending on the target's Access Point (AP)**, to recover the plain text WPA/WPA2 passphrase the **average** amount of time for the transitional **online brute force** method is **between 4-10 hours**. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
When using the **offline attack**, **if** the AP is vulnerable, it may take only a matter of **seconds to minutes**.The first version of **reaver-wps** (reaver 1.0) was created by **Craig Heffner** in 2011.
**reaver-wps-fork-t6x** version **1.6.x** is a **community forked version** which includes **various bug fixes**, **new features** and additional attack method (such as the **offline Pixie Dust** attack).* The original Reaver (version 1.0 to 1.4) can be found in [google code archives](https://code.google.com/p/reaver-wps/).
* The discontinued reaver-wps-fork-t6x community edition, reaver version 1.5.3, which includes the Pixie Dust attack, is now the [old-master branch](https://github.com/t6x/reaver-wps-fork-t6x/tree/master-old) from this repository.
* The latest revison of reaver-wps-fork-t6x community edition is the [master branch](https://github.com/t6x/reaver-wps-fork-t6x) from this repository.
Reaver versioning was updated to **1.6.x** in order to identify the new cycle.
All stable relases since the first beta version of reaver 1.6 can be downloaded from our [Releases](https://github.com/t6x/reaver-wps-fork-t6x/releases) page.
* More information about the Pixie Dust attack (including **which APs are vulnerable**) can be found in [pixiewps repository](https://github.com/wiire/pixiewps),
[pixie dust thread (in Kali forum)](https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-(Offline-WPS-Attack)) & [Dominique Bongard's full disclosure](https://docs.google.com/spreadsheets/d/1tSlbqVQ59kGn8hgmwcPTHUECQ3o9YhXR91A_p7Nnj5Y/edit?usp=sharing)- - -
# Requirements
## Build-time dependencies
- libpcap-dev
- build-essential## Optional build-time dependencies
in case your kernel doesn't support wext extensions
(which is unfortunately the case on most modern distros),
the included code to switch wireless channels won't work.
you can still either switch the channel manually before
running reaver/wash without using the channel options,
or build against one of the 2 libnl implementations below.- libnl-3-dev libnl-genl-3-dev
- libnl-tinythen use either ./configure --enable-libnl3 or --enable-libnl-tiny.
## Runtime-time dependencies
- pixiewps (optional, required for pixiedust attack)
- aircrack-ng (optional, though recommended)## Example
```
sudo apt -y install build-essential libpcap-dev aircrack-ng pixiewps
```
_The example uses [Kali Linux](https://www.kali.org/) as the Operating System (OS) as `pixiewps` is included._You **must** already have Wiire's Pixiewps installed to perform a pixie dust attack, latest version can be found in its [official github repository](https://github.com/wiire/pixiewps).
- - -
# Setup
**Download**
`git clone https://github.com/t6x/reaver-wps-fork-t6x`
or
`wget https://github.com/t6x/reaver-wps-fork-t6x/archive/master.zip && unzip master.zip`
**Locate the shell**
`cd reaver-wps-fork-t6x*`
`cd src`**Compile**
`./configure`
`make`**Install**
`sudo make install`
- - -
# Reaver Usage
```
Copyright (c) 2011, Tactical Network Solutions, Craig HeffnerRequired Arguments:
-i, --interface= Name of the monitor-mode interface to use
-b, --bssid= BSSID of the target APOptional Arguments:
-m, --mac= MAC of the host system
-e, --essid= ESSID of the target AP
-c, --channel= Set the 802.11 channel for the interface (implies -f)
-s, --session= Restore a previous session file
-C, --exec= Execute the supplied command upon successful pin recovery
-f, --fixed Disable channel hopping
-5, --5ghz Use 5GHz 802.11 channels
-v, --verbose Display non-critical warnings (-vv or -vvv for more)
-q, --quiet Only display critical messages
-h, --help Show helpAdvanced Options:
-p, --pin= Use the specified pin (may be arbitrary string or 4/8 digit WPS pin)
-d, --delay= Set the delay between pin attempts [1]
-l, --lock-delay= Set the time to wait if the AP locks WPS pin attempts [60]
-g, --max-attempts= Quit after num pin attempts
-x, --fail-wait= Set the time to sleep after 10 unexpected failures [0]
-r, --recurring-delay= Sleep for y seconds every x pin attempts
-t, --timeout= Set the receive timeout period [10]
-T, --m57-timeout= Set the M5/M7 timeout period [0.40]
-A, --no-associate Do not associate with the AP (association must be done by another application)
-N, --no-nacks Do not send NACK messages when out of order packets are received
-S, --dh-small Use small DH keys to improve crack speed
-L, --ignore-locks Ignore locked state reported by the target AP
-E, --eap-terminate Terminate each WPS session with an EAP FAIL packet
-J, --timeout-is-nack Treat timeout as NACK (DIR-300/320)
-F, --ignore-fcs Ignore frame checksum errors
-w, --win7 Mimic a Windows 7 registrar [False]
-K, --pixie-dust Run pixiedust attack
-Z Run pixiedust attack
-O, --output-file= Write packets of interest into pcap file
-M, --mac-changer Change the last digit of the MAC Address for each pin attempt [False]Example:
reaver -i wlan0mon -b 00:90:4C:C1:AC:21 -vv
```
Options description and examples of use can be found in the [Readme from Craig Heffner](https://github.com/t6x/reaver-wps-fork-t6x/blob/master/docs/README.REAVER). Here comes a description of the new options introduced since then:
## -K or -Z // --pixie-dust
The `-K` and `-Z` option perform the offline attack, Pixie Dust _(`pixiewps`)_, by automatically passing the **PKE**, **PKR**, **E-Hash1**, **E-Hash2**, **E-Nonce** and **Authkey** variables. `pixiewps` will then try to attack **Ralink**, **Broadcom** and **Realtek** detected chipset.
**Special note**: If you are attacking a **Realtek AP**, **do NOT** use small DH Keys (`-S`) option.
User will have to execute reaver with the cracked PIN (option -p) to get the WPA pass-phrase.
This is a temporary solution and an option to do a full attack will be implemented soon
## -p with arbitrary string // --pin=
See our wiki: [Introducing a new way to crack WPS: Option p with an Arbitrary String](https://github.com/t6x/reaver-wps-fork-t6x/wiki/Introducing-a-new-way-to-crack-WPS:-Option--p-with-an-Arbitrary-String)# Wash Usage
```
Copyright (c) 2011, Tactical Network Solutions, Craig HeffnerRequired Arguments:
-i, --interface= Interface to capture packets on
-f, --file [FILE1 FILE2 FILE3 ...] Read packets from capture filesOptional Arguments:
-c, --channel= Channel to listen on [auto]
-n, --probes= Maximum number of probes to send to each AP in scan mode [15]
-O, --output-file= Write packets of interest into pcap file
-F, --ignore-fcs Ignore frame checksum errors
-2, --2ghz Use 2.4GHz 802.11 channels
-5, --5ghz Use 5GHz 802.11 channels
-s, --scan Use scan mode
-u, --survey Use survey mode [default]
-a, --all Show all APs, even those without WPS
-j, --json print extended WPS info as json
-U, --utf8 Show UTF8 ESSID (does not sanitize ESSID, dangerous)
-p, --progress Show percentage of crack progress
-h, --help Show helpExample:
wash -i wlan0mon
```A detailed description of the options with concrete syntax examples can be found in [Craig Heffner's wash readme](https://github.com/t6x/reaver-wps-fork-t6x/blob/master/docs/README.WASH).
About the new options and features:
## -a // --all
The option `-a` of Wash will list all access points, including those without WPS enabled.
## -j // --json
The extended WPS information (serial, model...) from the AP probe answer will be printed in the terminal (in json format)
## "Vendor" column
Wash now displays the manufacturer of the wifi chipset from the Acces Points in order to know if they are vulnerable to pixie dust attack.
## Stdout can be piped
Notice that wash output can be piped into other commands. For more information see the wiki article [Everything about the new options from wash](https://github.com/t6x/reaver-wps-fork-t6x/wiki/Everything-about-the-new-options-from-wash)
# Acknowledgements## Contribution
Creator of reaver-wps-fork-t6x "community edition":
`t6x`
Main developer since version 1.6b:
`rofl0r`Modifications made by:
`t6_x`, `DataHead`, `Soxrok2212`, `Wiire`, `AAnarchYY`, `kib0rg`, `KokoSoft`, `rofl0r`, `horrorho`, `binarymaster`, `Ǹotaz`, `Adde88`, `feitoi`Some ideas made by:
`nuroo`, `kcdtv`Bug fixes made by:
`alxchk`, `USUARIONUEVO`, `ldm314`, `vk496`, `falsovsky`, `rofl0r`, `xhebox`## Special Thanks
* `Soxrok2212` for all work done to help in the development of tools
* `Wiire` for developing Pixiewps
* `Craig Heffner` for creating Reaver and for the creation of default pin generators (D-Link, Belkin) - http://www.devttys0.com/
* `Dominique Bongard` for discovering the Pixie Dust attack.