Performs a brute force attack against an WiFi AP Protected Setup pin number
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases,
as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS,
and has been tested against a wide variety of access points and WPS implementations.
- Links to network / reaver
- Has a link diff
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:X0F:branches:network/reaver && cd $_
- Create Badge
Refresh
Refresh
Source Files (show unmerged sources)
Filename | Size | Changed |
---|---|---|
_service | 0000000785 785 Bytes | |
_servicedata | 0000000244 244 Bytes | |
reaver-1.6.6+9~git20210519.d6c931c.tar.xz | 0000339012 331 KB | |
reaver.changes | 0000001076 1.05 KB | |
reaver.spec | 0000001517 1.48 KB | |
reaver_MR350.patch | 0000004396 4.29 KB |
Latest Revision
Sergey Kondakov (X0F)
committed
(revision 3)
Comments 0