Name reaver
Version 1.0 (4acad9ba2d3f7fcd08209b840a2cdab2a2bf17ac)
Summary Reaver implements a brute force attack against Wifi Protected Setup
Description Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP’s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase
Section base
License GPL-2.0
Homepage https://code.google.com/p/reaver-wps/
Recipe file recipes-tests/reaver/reaver.bb
Layer meta-kali (krogoth branch)
Inherits
  • autotools
  • autotools-brokensep
  • siteconfig
  • siteinfo
Dependencies
  • autoconf-native
  • automake-native
  • gnu-config-native
  • libpcap
  • libtool-cross
  • libtool-native
  • sqlite3
  • virtual/i586-oe-linux-compilerlibs
  • virtual/i586-oe-linux-gcc
  • virtual/libc
PACKAGECONFIG options

Sources

git://git.kali.org/packages/reaver

Patches

None

Other branches

This recipe in other branches of meta-kali:

Branch Recipe
master reaver 1.0
krogoth (Yocto Project 2.1) reaver 1.0 (this recipe)