This script is for Slackware 14.1 only and may be outdated.

SlackBuilds Repository

14.1 > Network > reaver (1.3)

Reaver implements a brute force attack against Wifi Protected Setup (WPS)
registrar PINs in order to recover WPA/WPA2 passphrases, as described in
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and
has been tested against a wide variety of access points and WPS
implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
in 4-10 hours, depending on the AP. In practice, it will generally take half
this time to guess the correct WPS pin and recover the passphrase.

Maintained by: Marco Bonetti
Keywords: wpa,wpa2,wps,crack,airmon,airmon-ng,aircrack,aircrack-ng,security
ChangeLog: reaver

Homepage:
https://code.google.com/p/reaver-wps/

Source Downloads:
reaver-1.3.tar.gz (6ec7dbb11b67e1b4a20f2ceba5f69547)

Download SlackBuild:
reaver.tar.gz
reaver.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
doinst.sh
reaver.SlackBuild
reaver.info
slack-desc

Validated for Slackware 14.1

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds