Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: reaver | Distribution: Mageia |
Version: 1.6.6 | Vendor: Mageia.Org |
Release: 2.mga9 | Build date: Tue Mar 29 00:57:26 2022 |
Group: Networking/Other | Build host: localhost |
Size: 1009861 | Source RPM: reaver-1.6.6-2.mga9.src.rpm |
Packager: umeabot <umeabot> | |
Url: https://github.com/t6x/reaver-wps-fork-t6x | |
Summary: Brute force attack against Wifi Protected Setup |
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
GPLv2+
* Tue Mar 29 2022 umeabot <umeabot> 1.6.6-2.mga9 + Revision: 1831187 - Mageia 9 Mass Rebuild * Wed Mar 03 2021 daviddavid <daviddavid> 1.6.6-1.mga9 + Revision: 1696942 - new version: 1.6.6
/usr/bin/reaver /usr/bin/wash /usr/lib/.build-id /usr/lib/.build-id/a8 /usr/lib/.build-id/a8/d1749b33ff424b7c73646fcd4fa14b9072b484 /usr/lib/.build-id/a8/d1749b33ff424b7c73646fcd4fa14b9072b484.1 /usr/share/doc/reaver /usr/share/doc/reaver/README /usr/share/doc/reaver/README.REAVER /usr/share/doc/reaver/README.WASH /usr/share/licenses/reaver /usr/share/licenses/reaver/LICENSE /usr/share/man/man1/reaver.1.xz /var/lib/reaver/reaver.db
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Dec 26 11:38:45 2024