On 2019/03/20 00:05, Sebastian Reitenbach wrote:
> Hi,
> 
> attached a port of reaver, online WPS PIN cracker.
> 
> Reaver implements a brute force attack against Wifi Protected Setup (WPS) 
> registrar PINs in order to recover WPA/WPA2 passphrases, as described in 
> Brute forcing Wi-Fi Protected Setup When poor design meets poor 
> implementation. by Stefan Viehböck.
> Reaver has been designed to be a robust and practical attack against Wi-Fi 
> Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases 
> and has been tested against a wide variety of access points and WPS 
> implementations.
> Depending on the target's Access Point (AP), to recover the plain text 
> WPA/WPA2 passphrase the average amount of time for the transitional online 
> brute force method is between 4-10 hours. In practice, it will generally take 
> half this time to guess the correct WPS pin and recover the passphrase. When 
> using the offline attack, if the AP is vulnerable, it may take only a matter 
> of seconds to minutes.
> 
> tested and works for me on i386, with athn(4) interface.
> 
> any comments, concerns, test or even OKs welcome.

@sample /var/reaver/

probably missing some @extra or @extraunexec?

Reply via email to