From ed86910e6bec17716565d37b574b0a6ed08c43a9 Mon Sep 17 00:00:00 2001 From: Marco Bonetti Date: Thu, 2 Feb 2012 15:27:22 -0600 Subject: network/reaver: Added (brute force attack against Wifi Protected Setup) Signed-off-by: Erik Hanson --- network/reaver/README | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 network/reaver/README (limited to 'network/reaver/README') diff --git a/network/reaver/README b/network/reaver/README new file mode 100644 index 0000000000..c7d75af9ef --- /dev/null +++ b/network/reaver/README @@ -0,0 +1,11 @@ +Reaver implements a brute force attack against Wifi Protected Setup (WPS) +registrar PINs in order to recover WPA/WPA2 passphrases, as described in +http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. + +Reaver has been designed to be a robust and practical attack against WPS, and +has been tested against a wide variety of access points and WPS +implementations. + +On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase +in 4-10 hours, depending on the AP. In practice, it will generally take half +this time to guess the correct WPS pin and recover the passphrase. -- cgit v1.2.3