This is the command reaver that can be run in the OnWorks free hosting provider using one of our multiple free online workstations such as Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator
PROGRAM:
NAME
Reaver - WPS Cracker
SYNOPSIS
reaver -i <interface> -b <target bssid> -vv
DESCRIPTION
Reaver implements a brute force attack against WiFi Protected Setup which can crack the
WPS pin of an access point in a matter of hours and subsequently recover the WPA/WPA2
passphrase.
Specifically, Reaver targets the registrar functionality of WPS, which is flawed in that
it only takes 11,000 attempts to guess the correct WPS pin in order to become a WPS
registrar. Once registred as a registrar with the access point, the access point will give
you the WPA passphrase.
OPTIONS
-m, --mac=<mac>
MAC of the host system (should be resolved automatically)
-e, --essid=<ssid>
ESSID of the target AP. Unless cloaked, this will be resolved automatically.
-c, --channel=<channel>
Set the 802.11 channel for the interface (implies -f)
-o, --out-file=<file>
Send output to a log file [default: stdout]
-f, --fixed
Disable channel hopping
-5, --5ghz
Use 5GHz 802.11 channels
-v, --verbose
Display non-critical warnings (-vv for more)
-q, --quiet
Only display critical messages
-i, --interface=<wlan>
Name of the monitor-mode interface to use
-b, --bssid=<mac>
BSSID of the target AP
-p, --pin=<wps pin>
Use the specified WPS pin
-h, --help
Show help
Use reaver online using onworks.net services