| Name: | reaver |
|---|---|
| Version: | 1.4 |
| Release: | 3.el7 |
| Architecture: | aarch64 |
| Group: | Applications/System |
| Size: | 919807 |
| License: | GPLv2 |
| RPM: | reaver-1.4-3.el7.aarch64.rpm |
| Source RPM: | reaver-1.4-3.el7.src.rpm |
| Build Date: | Wed May 30 2018 |
| Build Host: | ca-buildarm02.us.oracle.com |
| Vendor: | Oracle America |
| URL: | http://code.google.com/p/reaver-wps/ |
| Summary: | Brute force attack against Wifi Protected Setup |
| Description: | Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. |
- Fixed CFLAGS in wps/libwps and built them with -fPIC (by cflags patch)
- Added bundled library modification
- Initial release