Home > Repositories > base > reaver (i586)

reaver: Performs a brute force attack against an access point's WiFi Protected Setup pin number

Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number.
Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured.
While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.
Name:reaver
Release: 1.6.6-1mamba
Architecture:i586
Group:Applications/Security
Size:455.98 kB
Upstream URL:https://code.google.com/p/reaver-wps/
Source RPM:reaver
BrothersProvidesObsoletesRequiresRecommends
reaver-debug
reaver = 0:1.6.6-1mamba
reaver(x86-32) = 0:1.6.6-1mamba
libc.so.6(GLIBC_2.7) [1]
libm.so.6 [1]
libm.so.6(GLIBC_2.0) [1]
libm.so.6(GLIBC_2.29) [1]
libpcap.so.1 [1]
libpthread.so.0 [1]
libpthread.so.0(GLIBC_2.0) [1]
libpthread.so.0(GLIBC_2.1) [1]
rtld(GNU_HASH) [1]
Provided files