2012.1

x86_64/MRB-testingx86_64/MRB-rpmsx86_64/MRB-srpms
i686/MRB-testingi686/MRB-rpmsi686/MRB-srpms

2012LTS

x86_64/MRB-testingx86_64/MRB-rpmsx86_64/MRB-srpms
i686/MRB-testingi686/MRB-rpmsi686/MRB-srpms

Package details: reaver-1.4-69-mrb2012.0.x86_64.rpm



Name : reaver
Version : 1.4
Release : 69
Architecture: x86_64
Install Date: (not installed)
Group : Networking/Other
Size : 470026
License : GPLv2
Signature : DSA/SHA1, Thu Aug 15 16:43:27 2013, Key ID 814c3f67742003c3
Source RPM : reaver-1.4-69.src.rpm
Build Date : Thu Aug 15 16:43:27 2013
Build Host : symbianflo
Relocations : (not relocatable)
Packager : Falticska Florin
Vendor : Mandrivausers Romania Backports
URL : http://code.google.com/p/reaver-wps/
Bug URL : http://bugs.rosalinux.ru/
Summary : Brute force attack against Wifi Protected Setup
Description :
Reaver implements a brute force attack against Wifi Protected Setup (WPS)
registrar PINs in order to recover WPA/WPA2 passphrases, as described in
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and
has been tested against a wide variety of access points and WPS
implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
in 4-10 hours, depending on the AP. In practice, it will generally take half
this time to guess the correct WPS pin and recover the passphrase
Changelog:

MRB - Mandrivausers Romanian Backports is a Mandrivausers Romania Project
http://www.mandrivausers.ro