Bug 14202

Summary: reaver
Product: Mageia Reporter: Asel Luzarraga <aselluzarraga>
Component: New RPM package requestAssignee: Mageia Bug Squad <bugsquad>
Status: RESOLVED INVALID QA Contact:
Severity: normal    
Priority: Normal CC: jani.valimaa
Version: Cauldron   
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: http://code.google.com/p/reaver-wps/
Whiteboard:
Source RPM: CVE:
Status comment:

Description Asel Luzarraga 2014-09-30 21:45:22 CEST
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases,
as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS,
and has been tested against a wide variety of access points and WPS implementations.
Asel Luzarraga 2014-09-30 21:45:59 CEST

URL: (none) => http://code.google.com/p/reaver-wps/

Comment 1 Jani Välimaa 2014-10-14 20:20:20 CEST
We already have reaver 1.4 in Cauldron.

Status: NEW => RESOLVED
CC: (none) => jani.valimaa
Resolution: (none) => INVALID