Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
Attachment | Size | Date |
---|---|---|
reaver_1.4_armel.deb | 436.13 KB | 20/10/2013 - 14:20 |
Comments
oguzhanssan
Mon, 2016/03/14 - 19:01
Permalink
invalid installation package error
NielDK
Wed, 2013/10/23 - 22:21
Permalink
Probably because it needs root ?
You can download in terminal using
wget https://openrepos.net/sites/default/files/packages/500/reaver_1.4_armel.deb --no-check-certificate
and, as root (devel-su)
dpkg -i reaver_1.4_armel.deb
basil
Thu, 2013/10/24 - 11:34
Permalink
It is because your packages have dont have "Section" at control file. And "Unknown" section cannot be installed on phone using standard methods.
NielDK
Fri, 2013/10/25 - 16:17
Permalink
Thanks, good to know.
But, according to http://www.debian.org/doc/debian-policy/ch-controlfields.html
Only these control sections are mandatory ?
Package
Version
Architecture
Maintainer
Description
basil
Fri, 2013/10/25 - 16:30
Permalink
Yes, but you should comply Harmattan appendix for Debian Policy Manual. Specify user section or mark package as user visible.
raveJK
Wed, 2013/10/23 - 21:10
Permalink
How does one install this to Harmattan? I tried to do this from warehouse and it says "reaver is not user package". When downloading from website, it just says "installation failed".