CVSROOT:        /cvs
Module name:    ports
Changes by:     [email protected]        2019/04/16 14:45:43

Log message:
    import reaver
    
    Reaver implements a brute force attack against Wifi Protected Setup
    (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as
    described in Brute forcing Wi-Fi Protected Setup When poor design meets
    poor implementation. by Stefan Viehboeck.  Reaver has been designed to
    be a robust and practical attack against Wi-Fi Protected Setup (WPS)
    registrar PINs in order to recover WPA/WPA2 passphrases and has been
    tested against a wide variety of access points and WPS implementations.
    Depending on the target's Access Point (AP), to recover the plain text
    WPA/WPA2 passphrase the average amount of time for the transitional
    online brute force method is between 4-10 hours. In practice, it will
    generally take half this time to guess the correct WPS pin and recover
    the passphrase. When using the offline attack, if the AP is vulnerable,
    it may take only a matter of seconds to minutes.
    
    feedback and OK already some time ago sthen@, gonzalo@
    
    Status:
    
    Vendor Tag: sebastia
    Release Tags:       sebastia_20190416
    
    N ports/security/reaver/Makefile
    N ports/security/reaver/distinfo
    N ports/security/reaver/patches/patch-src_80211_c
    N ports/security/reaver/patches/patch-src_builder_c
    N ports/security/reaver/patches/patch-src_iface_c
    N ports/security/reaver/patches/patch-src_lwe_iwlib_h
    N ports/security/reaver/patches/patch-src_config_mak_in
    N ports/security/reaver/pkg/DESCR
    N ports/security/reaver/pkg/PLIST
    
    No conflicts created by this import

Reply via email to