Name : reaver
| |
Version : 1.4
| Vendor : http://Packman_links2linux_de
|
Release : 150600.1.pm.8
| Date : 2024-12-24 01:44:30
|
Group : Productivity/Networking/Security
| Source RPM : reaver-1.4-150600.1.pm.8.src.rpm
|
Size : 0.92 MB
| |
Packager : packman_links2linux_de
| |
Summary : Brute force attack against Wifi Protected Setup
|
Description :
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP\'s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
|
RPM found in directory: /packages/linux-pbone/packman.iu-bremen.de/suse/openSUSE_Leap_15.6/Extra/x86_64 |
Hmm ... It's impossible ;-) This RPM doesn't exist on any FTP server
Provides :
config(reaver)
reaver
reaver(x86-64)
Requires :