WiFiReaver. Wireless File Reaver.
Automatic key injection using Dictionary for Wireless Networks.
The main features are the Wireless Network scanner, wireless open networks, and automatic key injection using dictionary for Wireless Networks.
Works with Wireless Networks with encryption type WEP, WPA and WPA2, and located on the SD Dictionaries plain text with line break for each key. Is connecting to open networks by clicking on the open network.
Audits Wireless Networks without the Aircrack-ng suite, or wireless cards support monitor mode, no clients connected, not capture handshake, and not capture ARP's.
Its operation is based on checking one by one from the key found in the selected dictionary, against the selected AP.
Select the dictionary located in the SD, also select the AP to audit, click on "Start" and begin the process of automatic key injection.
The automatic key injection, terminates if the key is to get the correct IP address and connection to the AP, or when the end of dictionary selected, or manually by selecting 'Stop'.
If the Log option is enabled, generates a text file named ESSID.log at the root of the SD, where keys are stored injected Wireless Network, and the results of its testing in the router.
If the Turbo option is enabled, the scanner speeds and automatic injection keys using dictionary for Wireless Networks.
Show details of the Wireless Network: ESSID, BSSID, Frequency, Channel, RSSI, and the type of authentication and encryption.
Injection keys using against AP's Dictionary is based on the same idea WlanReaver, Airwin or Airlin.
Tool for recovering WEP, WPA and WPA2. Always change the default settings of the applications or services that we use, especially access data such as passwords to the default.
The use of this product wireless analysis software should be a basic tool for professionals and individuals who are eager to know the security level of wireless facilities is strictly forbidden to use it to commit criminal acts of intrusion on wireless networks of which we do not own or do not have permissions to analyze their security.