Sophie

Sophie

distrib > Mageia > 6 > i586 > media > core-release-src > by-pkgid > 89aca03cc2ad8eab59342ce421c312fd > files > 2

reaver-1.4-5.mga6.src.rpm

Name:		reaver
Version:	1.4
Release:	%mkrel 5
Summary:	Brute force attack against Wifi Protected Setup
License:	GPLv2+
Group:		Networking/Other
URL:		http://code.google.com/p/reaver-wps/
Source:		http://reaver-wps.googlecode.com/files/reaver-%{version}.tar.gz
BuildRequires:	libpcap-devel
BuildRequires:	sqlite3-devel

%description
Reaver implements a brute force attack against Wifi Protected Setup (WPS)
registrar PINs in order to recover WPA/WPA2 passphrases, as described in
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and
has been tested against a wide variety of access points and WPS
implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
in 4-10 hours, depending on the AP. In practice, it will generally take half
this time to guess the correct WPS pin and recover the passphrase.

%prep 
%setup -q

%build
cd src
%configure2_5x
%make

%install
cd src
install -d -m 755 %{buildroot}%{_bindir}
install -d -m 755 %{buildroot}%{_sysconfdir}/reaver
install -m 755 reaver %{buildroot}%{_bindir}

%files
%doc docs/LICENSE docs/README
%{_bindir}/reaver



%changelog
* Mon Feb 08 2016 umeabot <umeabot> 1.4-5.mga6
+ Revision: 946554
- Mageia 6 Mass Rebuild

* Wed Oct 15 2014 umeabot <umeabot> 1.4-4.mga5
+ Revision: 741921
- Second Mageia 5 Mass Rebuild

* Tue Sep 16 2014 umeabot <umeabot> 1.4-3.mga5
+ Revision: 688631
- Mageia 5 Mass Rebuild

* Tue Aug 12 2014 juancho <juancho> 1.4-2.mga5
+ Revision: 661908
+ rebuild (emptylog)

* Tue Aug 12 2014 juancho <juancho> 1.4-1.mga5
+ Revision: 661903
- Added sqlite3-devel BR
- Updated to version 1.4
- Cleaned up spec, added BR libpcap-devel

  + guillomovitch <guillomovitch>
    - imported package reaver


* Fri Dec 30 2011 Guillaume Rousse <guillomovitch@mandriva.org> 1.1-1.mga2
- first mageia package