0% found this document useful (0 votes)
197 views2 pages

Kali Linux Reaver Setup Untuk Beginner

This document provides instructions for downloading, compiling, and installing the Reaver tool on Kali Linux. It can be used to conduct WiFi Protected Setup (WPS) attacks against routers to recover their WPA/WPA2 passwords. The document also includes details on required and optional arguments for using Reaver, such as specifying the network interface, target access point MAC address, and attack options.

Uploaded by

Mat ICT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
197 views2 pages

Kali Linux Reaver Setup Untuk Beginner

This document provides instructions for downloading, compiling, and installing the Reaver tool on Kali Linux. It can be used to conduct WiFi Protected Setup (WPS) attacks against routers to recover their WPA/WPA2 passwords. The document also includes details on required and optional arguments for using Reaver, such as specifying the network interface, target access point MAC address, and attack options.

Uploaded by

Mat ICT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Kali Linux Reaver Setup

Download

git clone https://github.com/t6x/reaver-wps-fork-t6x


or

wget https://github.com/t6x/reaver-wps-fork-t6x/archive/master.zip && unzip


master.zip
Locate the shell

cd reaver-wps-fork-t6x*
cd src
Compile

./configure
make
Install

sudo make install

Reaver Usage
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner
<[email protected]>

Required Arguments:
-i, --interface=<wlan> Name of the monitor-mode interface to use
-b, --bssid=<mac> BSSID of the target AP

Optional Arguments:
-m, --mac=<mac> MAC of the host system
-e, --essid=<ssid> ESSID of the target AP
-c, --channel=<channel> Set the 802.11 channel for the interface
(implies -f)
-s, --session=<file> Restore a previous session file
-C, --exec=<command> Execute the supplied command upon successful
pin recovery
-f, --fixed Disable channel hopping
-5, --5ghz Use 5GHz 802.11 channels
-v, --verbose Display non-critical warnings (-vv or -vvv
for more)
-q, --quiet Only display critical messages
-h, --help Show help
Advanced Options:
-p, --pin=<wps pin> Use the specified pin (may be arbitrary
string or 4/8 digit WPS pin)
-d, --delay=<seconds> Set the delay between pin attempts [1]
-l, --lock-delay=<seconds> Set the time to wait if the AP locks WPS pin
attempts [60]
-g, --max-attempts=<num> Quit after num pin attempts
-x, --fail-wait=<seconds> Set the time to sleep after 10 unexpected
failures [0]
-r, --recurring-delay=<x:y> Sleep for y seconds every x pin attempts
-t, --timeout=<seconds> Set the receive timeout period [10]
-T, --m57-timeout=<seconds> Set the M5/M7 timeout period [0.40]
-A, --no-associate Do not associate with the AP (association
must be done by another application)
-N, --no-nacks Do not send NACK messages when out of order
packets are received
-S, --dh-small Use small DH keys to improve crack speed
-L, --ignore-locks Ignore locked state reported by the target
AP
-E, --eap-terminate Terminate each WPS session with an EAP FAIL
packet
-J, --timeout-is-nack Treat timeout as NACK (DIR-300/320)
-F, --ignore-fcs Ignore frame checksum errors
-w, --win7 Mimic a Windows 7 registrar [False]
-K, --pixie-dust Run pixiedust attack
-Z Run pixiedust attack

Example:
reaver -i wlan0mon -b 00:90:4C:C1:AC:21 -vv

You might also like