SlackBuilds Repository

15.0 > Network > reaver (1.6.1)

Reaver implements a brute force attack against Wifi Protected Setup
(WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as
described in:

Reaver has been designed to be a robust and practical attack against
WPS, and has been tested against a wide variety of access points and
WPS implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2
passphrase in 4-10 hours, depending on the AP. In practice, it will
generally take half this time to guess the correct WPS pin and recover
the passphrase.

Maintained by: Marco Bonetti
Keywords: wpa,wpa2,wps,crack,airmon,airmon-ng,aircrack,aircrack-ng,security
ChangeLog: reaver


Source Downloads:
reaver-wps-fork-t6x-1.6.1.tar.gz (8251f387287ef7150fd90021d0aed4ec)

Download SlackBuild:
reaver.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:

Validated for Slackware 15.0

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds