Name: reaver Version: 1.4 Release: %mkrel 5 Summary: Brute force attack against Wifi Protected Setup License: GPLv2+ Group: Networking/Other URL: http://code.google.com/p/reaver-wps/ Source: http://reaver-wps.googlecode.com/files/reaver-%{version}.tar.gz BuildRequires: libpcap-devel BuildRequires: sqlite3-devel %description Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. %prep %setup -q %build cd src %configure2_5x %make %install cd src install -d -m 755 %{buildroot}%{_bindir} install -d -m 755 %{buildroot}%{_sysconfdir}/reaver install -m 755 reaver %{buildroot}%{_bindir} %files %doc docs/LICENSE docs/README %{_bindir}/reaver %changelog * Mon Feb 08 2016 umeabot <umeabot> 1.4-5.mga6 + Revision: 946554 - Mageia 6 Mass Rebuild * Wed Oct 15 2014 umeabot <umeabot> 1.4-4.mga5 + Revision: 741921 - Second Mageia 5 Mass Rebuild * Tue Sep 16 2014 umeabot <umeabot> 1.4-3.mga5 + Revision: 688631 - Mageia 5 Mass Rebuild * Tue Aug 12 2014 juancho <juancho> 1.4-2.mga5 + Revision: 661908 + rebuild (emptylog) * Tue Aug 12 2014 juancho <juancho> 1.4-1.mga5 + Revision: 661903 - Added sqlite3-devel BR - Updated to version 1.4 - Cleaned up spec, added BR libpcap-devel + guillomovitch <guillomovitch> - imported package reaver * Fri Dec 30 2011 Guillaume Rousse <guillomovitch@mandriva.org> 1.1-1.mga2 - first mageia package