Name: reaver Version: 1.6.5 Release: 1mamba Summary: Performs a brute force attack against an access point's WiFi Protected Setup pin number Group: Applications/Security Vendor: openmamba Distribution: openmamba Packager: Silvan Calarco URL: https://code.google.com/p/reaver-wps/ Source: https://github.com/t6x/reaver-wps-fork-t6x/archive/v%{version}.zip #Source: https://reaver-wps.googlecode.com/files/reaver-%{version}.tar.gz License: GPL ## AUTOBUILDREQ-BEGIN BuildRequires: glibc-devel BuildRequires: libpcap-devel BuildRequires: libsqlite-devel ## AUTOBUILDREQ-END BuildRoot: %{_tmppath}/%{name}-%{version}-root %description Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured. While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known. %debug_package %prep %setup -q -n reaver-wps-fork-t6x-%{version} %build cd src %configure %make %install [ "%{buildroot}" != / ] && rm -rf "%{buildroot}" cd src install -d -m0755 %{buildroot}%{_sysconfdir}/reaver install -d -m0755 %{buildroot}%{_bindir}/ #install -D -m0644 reaver.db %{buildroot}%{_sysconfdir}/reaver/reaver.db install -D -m0755 reaver %{buildroot}%{_bindir}/reaver install -D -m0755 wash %{buildroot}%{_bindir}/wash %clean [ "%{buildroot}" != / ] && rm -rf "%{buildroot}" %files %defattr(-,root,root) #%{_sysconfdir}/reaver/reaver.db %{_bindir}/reaver %{_bindir}/wash %changelog * Mon Jul 09 2018 Automatic Build System 1.6.5-1mamba - automatic version update by autodist * Sat Apr 15 2017 Ercole 'ercolinux' Carpanetto 1.5.2-1mamba - update to 1.5.2 * Thu Aug 21 2014 Silvan Calarco 1.4-1mamba - package created using the webbuild interface