[NLUUG]   Welcome to ftp.vim.org,
Hosted by ftp.nluug.nl
Current directory: /ftp/os/Linux/distr/salix/i486/extra-15.0/source/network/reaver/
Contents of README:
Reaver implements a brute force attack against Wifi Protected Setup
(WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as
described in:
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against
WPS, and has been tested against a wide variety of access points and
WPS implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2
passphrase in 4-10 hours, depending on the AP. In practice, it will
generally take half this time to guess the correct WPS pin and recover
the passphrase.

Icon  Name                                                      Last modified      Size  
[DIR] Parent Directory - [TXT] README 11-Jun-2022 13:48 592 [   ] reaver-wps-fork-t6x-1.6.1.tar.gz 11-Jun-2022 13:48 482K [TXT] reaver.SlackBuild 11-Mar-2022 06:34 3.4K [   ] reaver.info 11-Jun-2022 13:48 332 [TXT] slack-desc 11-Jun-2022 13:48 763

NLUUG - Open Systems. Open Standards
Become a member and get discounts on conferences and more, see the NLUUG website!