WiFiReaver. Wireless File Reaver.
Automatic key injection using Dictionary for Wireless Networks.
The main features are the Wireless Network scanner, wireless open networks, and automatic key injection using dictionary for Wireless Networks.
Works with Wireless Networks with encryption type WEP, WPA and WPA2, and located on the SD Dictionaries plain text with line break for each key. Is connecting to open networks by clicking on the open network.
The donation version includes more features, among these new features include button mode on or off Log to create a log of key automatic injection Wireless Networks. Besides checking all the keys found in the selected dictionary.
Audits Wireless Networks without the Aircrack-ng suite, or wireless cards support monitor mode, no clients connected, not capture handshake, and not capture ARP's.
Its operation is based on checking one by one from the key found in the selected dictionary, against the selected AP.
Select the dictionary located in the SD, also select the AP to audit, click on "Start" and begin the process of automatic key injection.
The automatic key injection, terminates if the key is to get the correct IP address and connection to the AP, or when the end of dictionary selected, or manually by selecting 'Stop'.
Show details of the Wireless Network: ESSID, BSSID, Frequency, Channel, RSSI, and the type of authentication and encryption.
Injection keys using against AP's Dictionary is based on the same idea WlanReaver, Airwin or Airlin.
The demo version includes 20 key testing calculation found in the selected dictionary.
Tool for recovering WEP, WPA and WPA2. Always change the default settings of the applications or services that we use, especially access data such as passwords to the default.
The use of this product wireless analysis software should be a basic tool for professionals and individuals who are eager to know the security level of wireless facilities is strictly forbidden to use it to commit criminal acts of intrusion on wireless networks of which we do not own or do not have permissions to analyze their security.