diff options
author | Marco Bonetti <sid77@slackware.it> | 2012-02-02 15:27:22 -0600 |
---|---|---|
committer | Robby Workman <rworkman@slackbuilds.org> | 2012-02-11 21:19:29 -0600 |
commit | ed86910e6bec17716565d37b574b0a6ed08c43a9 (patch) | |
tree | 65ee81c0220a968ef11027f9792d2be8ba3d660d /network/reaver/README | |
parent | c564777ec4fb12be96cab0a001ca51878c423590 (diff) | |
download | slackbuilds-ed86910e6bec17716565d37b574b0a6ed08c43a9.tar.gz |
network/reaver: Added (brute force attack against Wifi Protected Setup)
Signed-off-by: Erik Hanson <erik@slackbuilds.org>
Diffstat (limited to 'network/reaver/README')
-rw-r--r-- | network/reaver/README | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/network/reaver/README b/network/reaver/README new file mode 100644 index 0000000000..c7d75af9ef --- /dev/null +++ b/network/reaver/README @@ -0,0 +1,11 @@ +Reaver implements a brute force attack against Wifi Protected Setup (WPS) +registrar PINs in order to recover WPA/WPA2 passphrases, as described in +http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. + +Reaver has been designed to be a robust and practical attack against WPS, and +has been tested against a wide variety of access points and WPS +implementations. + +On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase +in 4-10 hours, depending on the AP. In practice, it will generally take half +this time to guess the correct WPS pin and recover the passphrase. |