reaver - Brute force attack against Wifi Protected Setup

Distribution: Mageia Cauldron
Repository: Mageia Core i586
Package name: reaver
Package version: 1.4
Package release: 5.mga6
Package architecture: i586
Package type: rpm
Installed size: 366.46 KB
Download size: 103.03 KB
Official Mirror:
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.



  • reaver == 1.4-5.mga6
  • reaver(x86-32) == 1.4-5.mga6


    Install Howto

    1. Enable Mageia Core repository on "Install and Remove Software"
    2. Update packages list:
      # urpmi.update -a
    3. Install reaver rpm package:
      # urpmi reaver


    • /usr/bin/reaver
    • /usr/share/doc/reaver/LICENSE
    • /usr/share/doc/reaver/README


    2016-02-08 - umeabot <umeabot> 1.4-5.mga6 + Revision: 946554 - Mageia 6 Mass Rebuild

    2014-10-15 - umeabot <umeabot> 1.4-4.mga5 + Revision: 741921 - Second Mageia 5 Mass Rebuild

    2014-09-16 - umeabot <umeabot> 1.4-3.mga5 + Revision: 688631 - Mageia 5 Mass Rebuild

    2014-08-12 - juancho <juancho> 1.4-2.mga5 + Revision: 661908 + rebuild (emptylog)

    2014-08-12 - juancho <juancho> 1.4-1.mga5 + Revision: 661903 - Added sqlite3-devel BR - Updated to version 1.4 - Cleaned up spec, added BR libpcap-devel + guillomovitch <guillomovitch> - imported package reaver