slackbuilds_ponce/network/reaver
dsomero d0c108251a various: Update find command to match template.
Signed-off-by: dsomero <xgizzmo@slackbuilds.org>
2013-11-22 02:37:19 -05:00
..
doinst.sh network/reaver: Added (brute force attack against Wifi Protected Setup) 2012-02-11 21:19:29 -06:00
README network/reaver: Added (brute force attack against Wifi Protected Setup) 2012-02-11 21:19:29 -06:00
reaver.info Add REQUIRED field to .info files. 2012-08-19 21:57:51 -05:00
reaver.SlackBuild various: Update find command to match template. 2013-11-22 02:37:19 -05:00
slack-desc various: Fix slack-desc formatting and comment nit picks. 2013-11-22 02:29:22 -05:00

Reaver implements a brute force attack against Wifi Protected Setup (WPS)
registrar PINs in order to recover WPA/WPA2 passphrases, as described in
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and
has been tested against a wide variety of access points and WPS
implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
in 4-10 hours, depending on the AP. In practice, it will generally take half
this time to guess the correct WPS pin and recover the passphrase.