Hahah nice one! :)
On Tue, Apr 16, 2019 at 02:45:43PM -0600, Sebastian Reitenbach wrote:
> CVSROOT: /cvs
> Module name: ports
> Changes by: [email protected] 2019/04/16 14:45:43
>
> Log message:
> import reaver
>
> Reaver implements a brute force attack against Wifi Protected Setup
> (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as
> described in Brute forcing Wi-Fi Protected Setup When poor design meets
> poor implementation. by Stefan Viehboeck. Reaver has been designed to
> be a robust and practical attack against Wi-Fi Protected Setup (WPS)
> registrar PINs in order to recover WPA/WPA2 passphrases and has been
> tested against a wide variety of access points and WPS implementations.
> Depending on the target's Access Point (AP), to recover the plain text
> WPA/WPA2 passphrase the average amount of time for the transitional
> online brute force method is between 4-10 hours. In practice, it will
> generally take half this time to guess the correct WPS pin and recover
> the passphrase. When using the offline attack, if the AP is vulnerable,
> it may take only a matter of seconds to minutes.
>
> feedback and OK already some time ago sthen@, gonzalo@
>
> Status:
>
> Vendor Tag: sebastia
> Release Tags: sebastia_20190416
>
> N ports/security/reaver/Makefile
> N ports/security/reaver/distinfo
> N ports/security/reaver/patches/patch-src_80211_c
> N ports/security/reaver/patches/patch-src_builder_c
> N ports/security/reaver/patches/patch-src_iface_c
> N ports/security/reaver/patches/patch-src_lwe_iwlib_h
> N ports/security/reaver/patches/patch-src_config_mak_in
> N ports/security/reaver/pkg/DESCR
> N ports/security/reaver/pkg/PLIST
>
> No conflicts created by this import
>