Home > Repositories > base > reaver (i586)
reaver: Performs a brute force attack against an access point's WiFi Protected Setup pin number
Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number.
Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured.
While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.
Name: | reaver |
Release: |
1.6.6-1mamba |
Architecture: | i586 |
Group: | Applications/Security |
Size: | 455.98 kB |
Upstream URL: | https://code.google.com/p/reaver-wps/ |
Source RPM: | reaver |
Brothers | Provides | Obsoletes | Requires | Recommends |
---|
reaver-debug
| reaver = 0:1.6.6-1mamba reaver(x86-32) = 0:1.6.6-1mamba
| | libc.so.6(GLIBC_2.7) [1] libm.so.6 [1] libm.so.6(GLIBC_2.0) [1] libm.so.6(GLIBC_2.29) [1] libpcap.so.1 [1] libpthread.so.0 [1] libpthread.so.0(GLIBC_2.0) [1] libpthread.so.0(GLIBC_2.1) [1] rtld(GNU_HASH) [1]
| |
Provided files/usr/bin/reaver
/usr/bin/wash
/usr/lib/.build-id
/usr/lib/.build-id/a2
/usr/lib/.build-id/a2/11874a41629195b15cb78f1890d72d4d101d87
/usr/lib/.build-id/a2/11874a41629195b15cb78f1890d72d4d101d87.1