Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: reaver | Distribution: Mageia |
Version: 1.6.6 | Vendor: Mageia.Org |
Release: 3.mga10 | Build date: Fri Jun 27 15:17:21 2025 |
Group: Networking/Other | Build host: localhost |
Size: 1215997 | Source RPM: reaver-1.6.6-3.mga10.src.rpm |
Packager: umeabot <umeabot> | |
Url: https://github.com/t6x/reaver-wps-fork-t6x | |
Summary: Brute force attack against Wifi Protected Setup |
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
GPLv2+
* Fri Jun 27 2025 umeabot <umeabot> 1.6.6-3.mga10 + Revision: 2212175 - Mageia 10 Mass Rebuild
/usr/bin/reaver /usr/bin/wash /usr/lib/.build-id /usr/lib/.build-id/03 /usr/lib/.build-id/03/6cf409263d42cf0ed9848b98cb09c41b21f0d9 /usr/lib/.build-id/03/6cf409263d42cf0ed9848b98cb09c41b21f0d9.1 /usr/share/doc/reaver /usr/share/doc/reaver/README /usr/share/doc/reaver/README.REAVER /usr/share/doc/reaver/README.WASH /usr/share/licenses/reaver /usr/share/licenses/reaver/LICENSE /usr/share/man/man1/reaver.1.xz /var/lib/reaver/reaver.db
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Jun 28 06:22:52 2025