Package : reaver > RPM : reaver-1.6.6-2.mga9.src.rpm
Basic items
Name | reaver |
Version | 1.6.6 |
Release | 2.mga9 |
URL | https://github.com/t6x/reaver-wps-fork-t6x |
Group | Networking/Other |
Summary | Brute force attack against Wifi Protected Setup |
Size | 343KB |
Arch | aarch64 |
License | GPLv2+ |
Description
Reaver implements a brute force attack against Wifi Protected Setup (WPS)
registrar PINs in order to recover WPA/WPA2 passphrases, as described in
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS, and
has been tested against a wide variety of access points and WPS
implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
in 4-10 hours, depending on the AP. In practice, it will generally take half
this time to guess the correct WPS pin and recover the passphrase.
registrar PINs in order to recover WPA/WPA2 passphrases, as described in
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS, and
has been tested against a wide variety of access points and WPS
implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
in 4-10 hours, depending on the AP. In practice, it will generally take half
this time to guess the correct WPS pin and recover the passphrase.
Media information
Distribution release | Mageia cauldron |
Media name | core-release |
Media arch | i586 |
Advanced items
Source RPM | NOT IN DATABASE ?! |
Build time | 2022-03-29 01:01:50 |
Changelog | View in Sophie |
Files | View in Sophie |
Dependencies | View in Sophie |