How to install Reaver on Ubuntu 17.04
To install Reaver on Ubuntu 17.04
Reaver is a penetration testing tool which implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 pass-phrases. It is to be noted that Reaver has been tested against a wide variety of access points and WPS implementations. You can easily install Reaver on your Ubuntu 17.04 machine and this article will guide you through that.
Installing Reaver
It is important to add the necessary repositories before you begin with the installation procedure.
root@linuxhelp1:~# add-apt-repository ppa:eugenesan/ppa This repository contains collection of customized, updated, ported and backported packages for two last LTS releases and latest pre-LTS release. Packages for older releases relocated to ppa:eugenesan/archive or deleted. +-------------------------------------------------------------------------------------+ | Disclaimer: +-------------------------------------------------------------------------------------+ * Packages in this a nd related PPAs are for personal use only. They developed specifically for several custom environments and may not work for you. * Usage of packages in this PPA, in some forms, might contradict licenses of software packaged in this and related PPAs. End users and administrator are responsible for runtime licensing and possible legal consequences. * Some packages provided with their dependencies while some might require additional Ubuntu repositories and external PPAs. Below is the list of . . . Press [ENTER] to continue or ctrl-c to cancel adding it gpg: keybox ' /tmp/tmp58gcy2yp/pubring.gpg' created gpg: /tmp/tmp58gcy2yp/trustdb.gpg: trustdb created gpg: key E61380B28313A596: public key " Launchpad synergy+" imported gpg: Total number processed: 1 gpg: imported: 1 OK
Once it is done, update the newly added repositories as follows.
root@linuxhelp1:~# apt-get update
Get:1 http://ppa.launchpad.net/eugenesan/ppa/ubuntu zesty InRelease [15.4 kB]
Hit:2 http://in.archive.ubuntu.com/ubuntu zesty InRelease
Hit:3 http://security.ubuntu.com/ubuntu zesty-security InRelease
Hit:4 http://in.archive.ubuntu.com/ubuntu zesty-updates InRelease
Hit:5 http://in.archive.ubuntu.com/ubuntu zesty-backports InRelease
Get:6 http://ppa.launchpad.net/eugenesan/ppa/ubuntu zesty/main amd64 Packages [1,100 B]
Get:7 http://ppa.launchpad.net/eugenesan/ppa/ubuntu zesty/main i386 Packages [1,108 B]
Get:8 http://ppa.launchpad.net/eugenesan/ppa/ubuntu zesty/main Translation-en [1,288 B]
Fetched 18.9 kB in 1s (12.3 kB/s)
Reading package lists... Done
Now is the time to install the Reaver package by invoking the following command.
root@linuxhelp1:~# apt-get install reaver -y
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
reaver
0 upgraded, 1 newly installed, 0 to remove and 117 not upgraded.
Need to get 236 kB of archives.
After this operation, 714 kB of additional disk space will be used.
Get:1 http://in.archive.ubuntu.com/ubuntu zesty/universe amd64 reaver amd64 1.4-2 [236 kB]
Fetched 236 kB in 1s (185 kB/s)
Selecting previously unselected package reaver.
(Reading database ... 168833 files and directories currently installed.)
Preparing to unpack .../reaver_1.4-2_amd64.deb ...
Unpacking reaver (1.4-2) ...
Setting up reaver (1.4-2) ...
Processing triggers for man-db (2.7.6.1-2) ...
Run the following command in order to know more about Reaver.
root@linuxhelp1:~# reaver --help
Reaver v1.4 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner < cheffner@tacnetsol.com>
Required Arguments:
-i, --interface=< wlan> Name of the monitor-mode interface to use
-b, --bssid=< mac> BSSID of the target AP
Optional Arguments:
-m, --mac=< mac> MAC of the host system
-e, --essid=< ssid> ESSID of the target AP
-c, --channel=< channel> Set the 802.11 channel for the interface (implies -f)
-o, --out-file=< file> Send output to a log file [stdout]
-s, --session=< file> Restore a previous session file
-C, --exec=< command> Execute the supplied command upon successful pin recovery
-D, --daemonize Daemonize reaver
-a, --auto Auto detect the best advanced options for the target AP
-f, --fixed Disable channel hopping
-5, --5ghz Use 5GHz 802.11 channels
-v, --verbose Display non-critical warnings (-vv for more)
-q, --quiet Only display critical messages
-h, --help Show help
Advanced Options:
-p, --pin=< wps pin> Use the specified 4 or 8 digit WPS pin
-d, --delay=< seconds> Set the delay between pin attempts [1]
-l, --lock-delay=< seconds> Set the time to wait if the AP locks WPS pin attempts [60]
-g, --max-attempts=< num> Quit after num pin attempts
-x, --fail-wait=< seconds> Set the time to sleep after 10 unexpected failures [0]
-r, --recurring-delay=< x:y> Sleep for y seconds every x pin attempts
-t, --timeout=< seconds> Set the receive timeout period [5]
-T, --m57-timeout=< seconds> Set the M5/M7 timeout period [0.20]
-A, --no-associate Do not associate with the AP (association must be done by another application)
-N, --no-nacks Do not send NACK messages when out of order packets are received
-S, --dh-small Use small DH keys to improve crack speed
-L, --ignore-locks Ignore locked state reported by the target AP
-E, --eap-terminate Terminate each WPS session with an EAP FAIL packet
-n, --nack Target AP always sends a NACK [Auto]
-w, --win7 Mimic a Windows 7 registrar [False]
That was it. Reaver is very simple to install and to work with.
Comments ( 0 )
No comments available