You are on page 1of 1

reaver: invalid option -- 'k'

[+] Switching mon0 to channel 10


Required Arguments:
-i, --interface=<wlan>
e
-b, --bssid=<mac>
Optional Arguments:
-m, --mac=<mac>
-e, --essid=<ssid>
-c, --channel=<channel>
(implies -f)
-o, --out-file=<file>
-s, --session=<file>
-C, --exec=<command>
sful pin recovery
-D, --daemonize
-a, --auto
r the target AP
-f, --fixed
-5, --5ghz
-v, --verbose
ore)
-q, --quiet
-h, --help
Advanced Options:
-p, --pin=<wps pin>
-d, --delay=<seconds>
-l, --lock-delay=<seconds>
pin attempts [60]
-g, --max-attempts=<num>
-x, --fail-wait=<seconds>
d failures [0]
-r, --recurring-delay=<x:y>
-t, --timeout=<seconds>
-T, --m57-timeout=<seconds>
-A, --no-associate
n must be done by another application)
-N, --no-nacks
der packets are received
-S, --dh-small
-L, --ignore-locks
et AP
-E, --eap-terminate
AIL packet
-n, --nack
-w, --win7

Name of the monitor-mode interface to us


BSSID of the target AP
MAC of the host system
ESSID of the target AP
Set the 802.11 channel for the interface
Send output to a log file [stdout]
Restore a previous session file
Execute the supplied command upon succes
Daemonize reaver
Auto detect the best advanced options fo
Disable channel hopping
Use 5GHz 802.11 channels
Display non-critical warnings (-vv for m
Only display critical messages
Show help
Use the specified 4 or 8 digit WPS pin
Set the delay between pin attempts [1]
Set the time to wait if the AP locks WPS
Quit after num pin attempts
Set the time to sleep after 10 unexpecte
Sleep for y seconds every x pin attempts
Set the receive timeout period [5]
Set the M5/M7 timeout period [0.20]
Do not associate with the AP (associatio
Do not send NACK messages when out of or
Use small DH keys to improve crack speed
Ignore locked state reported by the targ
Terminate each WPS session with an EAP F
Target AP always sends a NACK [Auto]
Mimic a Windows 7 registrar [False]

You might also like