Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Reaver"
From NetSec
Levi99Vmsb (Talk | contribs) (moving template to bottom/formatting) |
|||
(3 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
− | '''Reaver''' is a brute forcing | + | '''Reaver''' is a WPS brute forcing utility for [[Linux]] that exploits a [[Design Flaws|feature-flaw]] in [[wireless]] access points that have the quick-setup [[hardware]] button (WPS) for "easy setup", allowing an attacker to retrieve a WPA or WPA2 key. |
− | + | ||
− | + | ||
*[http://code.google.com/p/reaver-wps/wiki/README Reaver installation] | *[http://code.google.com/p/reaver-wps/wiki/README Reaver installation] |
Latest revision as of 00:33, 8 August 2012
Reaver is a WPS brute forcing utility for Linux that exploits a feature-flaw in wireless access points that have the quick-setup hardware button (WPS) for "easy setup", allowing an attacker to retrieve a WPA or WPA2 key.
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|