HI Stuart,
Am Mittwoch, März 20, 2019 12:33 CET, Stuart Henderson <[email protected]> 
schrieb:

> On 2019/03/20 00:05, Sebastian Reitenbach wrote:
> > Hi,
> >
> > attached a port of reaver, online WPS PIN cracker.
> >
> > Reaver implements a brute force attack against Wifi Protected Setup (WPS) 
> > registrar PINs in order to recover WPA/WPA2 passphrases, as described in 
> > Brute forcing Wi-Fi Protected Setup When poor design meets poor 
> > implementation. by Stefan Viehböck.
> > Reaver has been designed to be a robust and practical attack against Wi-Fi 
> > Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 
> > passphrases and has been tested against a wide variety of access points and 
> > WPS implementations.
> > Depending on the target's Access Point (AP), to recover the plain text 
> > WPA/WPA2 passphrase the average amount of time for the transitional online 
> > brute force method is between 4-10 hours. In practice, it will generally 
> > take half this time to guess the correct WPS pin and recover the 
> > passphrase. When using the offline attack, if the AP is vulnerable, it may 
> > take only a matter of seconds to minutes.
> >
> > tested and works for me on i386, with athn(4) interface.
> >
> > any comments, concerns, test or even OKs welcome.
>
> @sample /var/reaver/
>
> probably missing some @extra or @extraunexec?
>
updated version attached, replaced the @sample with @extra and @extraunexec
as you pointed out.

OK?
cheers,
Sebastian

Attachment: reaver.tar.gz
Description: application/gzip

Reply via email to