network/reaver: Wrap README at 72 columns.

Signed-off-by: B. Watson <yalhcru@gmail.com>
This commit is contained in:
B. Watson 2022-03-14 03:18:00 -04:00
parent 9f0a99dcda
commit 02d6736d69

View file

@ -1,11 +1,13 @@
Reaver implements a brute force attack against Wifi Protected Setup (WPS) Reaver implements a brute force attack against Wifi Protected Setup
registrar PINs in order to recover WPA/WPA2 passphrases, as described in (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as
described in:
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS, and Reaver has been designed to be a robust and practical attack against
has been tested against a wide variety of access points and WPS WPS, and has been tested against a wide variety of access points and
implementations. WPS implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase On average Reaver will recover the target AP's plain text WPA/WPA2
in 4-10 hours, depending on the AP. In practice, it will generally take half passphrase in 4-10 hours, depending on the AP. In practice, it will
this time to guess the correct WPS pin and recover the passphrase. generally take half this time to guess the correct WPS pin and recover
the passphrase.