Name |
reaver |
Version |
1.0 (4acad9ba2d3f7fcd08209b840a2cdab2a2bf17ac) |
Summary |
Reaver implements a brute force attack against Wifi Protected Setup |
Description |
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP’s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase |
Section |
base |
License |
GPL-2.0 |
Homepage |
https://code.google.com/p/reaver-wps/
|
Recipe file |
recipes-tests/reaver/reaver.bb
|
Layer |
meta-kali (krogoth branch) |
Inherits |
- autotools
- autotools-brokensep
- siteconfig
- siteinfo
|
Dependencies |
- autoconf-native
- automake-native
- gnu-config-native
- libpcap
- libtool-cross
- libtool-native
- sqlite3
- virtual/i586-oe-linux-compilerlibs
- virtual/i586-oe-linux-gcc
- virtual/libc
|
PACKAGECONFIG options |
|