Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@GithackTools618:~# reaver -h
- Reaver v1.6.4 WiFi Protected Setup Attack Tool
- Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com>
- Required Arguments:
- -i, --interface=<wlan> Name of the monitor-mode interface to use
- -b, --bssid=<mac> BSSID of the target AP
- Optional Arguments:
- -m, --mac=<mac> MAC of the host system
- -e, --essid=<ssid> ESSID of the target AP
- -c, --channel=<channel> Set the 802.11 channel for the interface (implies -f)
- -o, --out-file=<file> Send output to a log file [stdout]
- -s, --session=<file> Restore a previous session file
- -C, --exec=<command> Execute the supplied command upon successful pin recovery
- -D, --daemonize Daemonize reaver
- -f, --fixed Disable channel hopping
- -5, --5ghz Use 5GHz 802.11 channels
- -v, --verbose Display non-critical warnings (-vv or -vvv for more)
- -q, --quiet Only display critical messages
- -h, --help Show help
- Advanced Options:
- -p, --pin=<wps pin> Use the specified pin (may be arbitrary string or 4/8 digit WPS pin)
- -d, --delay=<seconds> Set the delay between pin attempts [1]
- -l, --lock-delay=<seconds> Set the time to wait if the AP locks WPS pin attempts [60]
- -g, --max-attempts=<num> Quit after num pin attempts
- -x, --fail-wait=<seconds> Set the time to sleep after 10 unexpected failures [0]
- -r, --recurring-delay=<x:y> Sleep for y seconds every x pin attempts
- -t, --timeout=<seconds> Set the receive timeout period [10]
- -T, --m57-timeout=<seconds> Set the M5/M7 timeout period [0.40]
- -A, --no-associate Do not associate with the AP (association must be done by another application)
- -N, --no-nacks Do not send NACK messages when out of order packets are received
- -S, --dh-small Use small DH keys to improve crack speed
- -L, --ignore-locks Ignore locked state reported by the target AP
- -E, --eap-terminate Terminate each WPS session with an EAP FAIL packet
- -J, --timeout-is-nack Treat timeout as NACK (DIR-300/320)
- -w, --win7 Mimic a Windows 7 registrar [False]
- -K, --pixie-dust Run pixiedust attack
- -Z Run pixiedust attack
- Example:
- reaver -i wlan0mon -b 00:90:4C:C1:AC:21 -vv
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement