Reaver implements a brute force attack against Wifi Protected Setup
(WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as
described in:
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against
WPS, and has been tested against a wide variety of access points and
WPS implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2
passphrase in 4-10 hours, depending on the AP. In practice, it will
generally take half this time to guess the correct WPS pin and recover
the passphrase.
Maintained by: Marco Bonetti
Keywords: wpa,wpa2,wps,crack,airmon,airmon-ng,aircrack,aircrack-ng,security
ChangeLog: reaver
Homepage:
https://github.com/t6x/reaver-wps-fork-t6x
Download SlackBuild:
reaver.tar.gz
reaver.tar.gz.asc (FAQ)
(the SlackBuild does not include the source)
Individual Files: |
README |
reaver.SlackBuild |
reaver.info |
slack-desc |
© 2006-2023 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of
Patrick Volkerding
Linux® is a registered trademark of
Linus Torvalds