WPA/WPA2 Cracking with Reaver

by admin

Tuesday, January 24th, 2012 at 11:09 am

The WiFi Protected Setup (WPS) protocol is vulnerable to a brute force attack that allows an attacker to recover an access point’s WPS pin, and subsequently the WPA/WPA2 passphrase, in just a matter of hours, using the open source tool called Reaver. Think your 32 character alpha-numeric password is uncrackable? If your wireless router is using WPS then your router may be spit back your password in plain-text to the attacker in less than 10 hrs. Reaver Test

Your IP: 172.71.254.13
Hostname: 172.71.254.13

We love our country, but fear our government.