2012.1

x86_64/MRB-testingx86_64/MRB-rpmsx86_64/MRB-srpms
i686/MRB-testingi686/MRB-rpmsi686/MRB-srpms

2012LTS

x86_64/MRB-testingx86_64/MRB-rpmsx86_64/MRB-srpms
i686/MRB-testingi686/MRB-rpmsi686/MRB-srpms

Package details: reaver-1.4-69-mrb2012.0.x86_64.rpm



Name : reaver Relocations: (not relocatable)
Version : 1.4 Vendor: Mandrivausers Romania Backports
Release : 69 Build Date: Thu Aug 15 16:43:27 2013
Install Date: (not installed) Build Host: symbianflo
Group : Networking/Other Source RPM: reaver-1.4-69.src.rpm
Size : 470026 License: GPLv2
Signature : DSA/SHA1, Thu Aug 15 16:43:27 2013, Key ID 814c3f67742003c3
Packager : Falticska Florin
URL : http://code.google.com/p/reaver-wps/
Summary : Brute force attack against Wifi Protected Setup
Description :
Reaver implements a brute force attack against Wifi Protected Setup (WPS)
registrar PINs in order to recover WPA/WPA2 passphrases, as described in
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and
has been tested against a wide variety of access points and WPS
implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
in 4-10 hours, depending on the AP. In practice, it will generally take half
this time to guess the correct WPS pin and recover the passphrase
Changelog:

MRB - Mandrivausers Romanian Backports is a Mandrivausers Romania Project
http://www.mandrivausers.ro