Hahah nice one! :)

On Tue, Apr 16, 2019 at 02:45:43PM -0600, Sebastian Reitenbach wrote:
> CVSROOT:      /cvs
> Module name:  ports
> Changes by:   [email protected]        2019/04/16 14:45:43
> 
> Log message:
>     import reaver
>     
>     Reaver implements a brute force attack against Wifi Protected Setup
>     (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as
>     described in Brute forcing Wi-Fi Protected Setup When poor design meets
>     poor implementation. by Stefan Viehboeck.  Reaver has been designed to
>     be a robust and practical attack against Wi-Fi Protected Setup (WPS)
>     registrar PINs in order to recover WPA/WPA2 passphrases and has been
>     tested against a wide variety of access points and WPS implementations.
>     Depending on the target's Access Point (AP), to recover the plain text
>     WPA/WPA2 passphrase the average amount of time for the transitional
>     online brute force method is between 4-10 hours. In practice, it will
>     generally take half this time to guess the correct WPS pin and recover
>     the passphrase. When using the offline attack, if the AP is vulnerable,
>     it may take only a matter of seconds to minutes.
>     
>     feedback and OK already some time ago sthen@, gonzalo@
>     
>     Status:
>     
>     Vendor Tag:       sebastia
>     Release Tags:     sebastia_20190416
>     
>     N ports/security/reaver/Makefile
>     N ports/security/reaver/distinfo
>     N ports/security/reaver/patches/patch-src_80211_c
>     N ports/security/reaver/patches/patch-src_builder_c
>     N ports/security/reaver/patches/patch-src_iface_c
>     N ports/security/reaver/patches/patch-src_lwe_iwlib_h
>     N ports/security/reaver/patches/patch-src_config_mak_in
>     N ports/security/reaver/pkg/DESCR
>     N ports/security/reaver/pkg/PLIST
>     
>     No conflicts created by this import
> 

Reply via email to