[NLUUG]   Welcome to ftp.nluug.nl
Current directory: /pub/os/Linux/distr/salix/sbo/14.1/network/reaver/
 
Current bandwidth utilization 629.26 Mbit/s
Bandwidth utilization bar
Contents of README:
Reaver implements a brute force attack against Wifi Protected Setup (WPS)
registrar PINs in order to recover WPA/WPA2 passphrases, as described in
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and
has been tested against a wide variety of access points and WPS
implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
in 4-10 hours, depending on the AP. In practice, it will generally take half
this time to guess the correct WPS pin and recover the passphrase.

Icon  Name                                        Last modified      Size  
[DIR] Parent Directory - [TXT] README 26-Nov-2013 10:57 591 [   ] doinst.sh 26-Nov-2013 10:57 380 [TXT] reaver.SlackBuild 26-Nov-2013 10:57 3.3K [   ] reaver.info 26-Nov-2013 10:57 292 [TXT] slack-desc 26-Nov-2013 10:57 763

NLUUG - Open Systems. Open Standards
Become a member and get discounts on conferences and more, see the NLUUG website!