Bug 14202 - reaver
Summary: reaver
Status: RESOLVED INVALID
Alias: None
Product: Mageia
Classification: Unclassified
Component: New RPM package request (show other bugs)
Version: Cauldron
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Mageia Bug Squad
QA Contact:
URL: http://code.google.com/p/reaver-wps/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-09-30 21:45 CEST by Asel Luzarraga
Modified: 2014-10-14 20:20 CEST (History)
1 user (show)

See Also:
Source RPM:
CVE:
Status comment:


Attachments

Description Asel Luzarraga 2014-09-30 21:45:22 CEST
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases,
as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS,
and has been tested against a wide variety of access points and WPS implementations.
Asel Luzarraga 2014-09-30 21:45:59 CEST

URL: (none) => http://code.google.com/p/reaver-wps/

Comment 1 Jani Välimaa 2014-10-14 20:20:20 CEST
We already have reaver 1.4 in Cauldron.

Status: NEW => RESOLVED
CC: (none) => jani.valimaa
Resolution: (none) => INVALID


Note You need to log in before you can comment on or make changes to this bug.