Performs a brute force attack against an WiFi AP Protected Setup pin number
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases,
as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS,
and has been tested against a wide variety of access points and WPS implementations.
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:mantarimay:apps/reaver && cd $_ - Create Badge
Refresh
Source Files
| Filename | Size | Changed |
|---|---|---|
| _service | 0000000785 785 Bytes | |
| _servicedata | 0000000244 244 Bytes | |
| reaver-1.6.6+9~git20210519.d6c931c.tar.xz | 0000339012 331 KB | |
| reaver.changes | 0000001076 1.05 KB | |
| reaver.spec | 0000001517 1.48 KB | |
| reaver_MR350.patch | 0000004396 4.29 KB |
Comments 0