Just a day after security researcher Stefan Viehbock released details of vulnerabilities in the WiFi Protected Setup (WPS) protocol that allows attackers to recover WPA/WPA2 passphrases in a matter of hour, a security firm "Tactical Network Solutions" has published an open-source tool capable of exploiting the vulnerability.
Reaver is WPS attack tool ,capable of breaking WPS pins and recovering the plain text WPA/WPA2 passphrase of the target access point in approximately 4-10 hours (attack time varies based on the access point).
There are two offerings of the Reaver tool. The free open source version, which has limited functionality and a commercial version which is user friendly and feature-rich
Download it from here:
http://code.google.com/p/reaver-wps/downloads/list
Reaver is WPS attack tool ,capable of breaking WPS pins and recovering the plain text WPA/WPA2 passphrase of the target access point in approximately 4-10 hours (attack time varies based on the access point).
There are two offerings of the Reaver tool. The free open source version, which has limited functionality and a commercial version which is user friendly and feature-rich
Download it from here:
http://code.google.com/p/reaver-wps/downloads/list