Name: reaver Version: 1.4 Release: 1mamba Summary: Performs a brute force attack against an access point's WiFi Protected Setup pin number Group: Applications/Security Vendor: openmamba Distribution: openmamba Packager: Silvan Calarco URL: https://code.google.com/p/reaver-wps/ Source: https://reaver-wps.googlecode.com/files/reaver-%{version}.tar.gz License: GPL ## AUTOBUILDREQ-BEGIN BuildRequires: glibc-devel BuildRequires: libpcap-devel BuildRequires: libsqlite-devel ## AUTOBUILDREQ-END BuildRoot: %{_tmppath}/%{name}-%{version}-root %description Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured. While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known. %debug_package %prep %setup -q %build cd src %configure %make %install [ "%{buildroot}" != / ] && rm -rf "%{buildroot}" cd src install -d -m0755 %{buildroot}%{_sysconfdir}/reaver install -d -m0755 %{buildroot}%{_bindir}/ install -D -m0644 reaver.db %{buildroot}%{_sysconfdir}/reaver/reaver.db install -D -m0755 reaver %{buildroot}%{_bindir}/reaver install -D -m0755 wash %{buildroot}%{_bindir}/wash %clean [ "%{buildroot}" != / ] && rm -rf "%{buildroot}" %files %defattr(-,root,root) %{_sysconfdir}/reaver/reaver.db %{_bindir}/reaver %{_bindir}/wash %changelog * Thu Aug 21 2014 Silvan Calarco 1.4-1mamba - package created using the webbuild interface