reaver/reaver.spec

56 lines
1.6 KiB
RPMSpec

Name: reaver
Version: 1.4
Release: 1mamba
Summary: Performs a brute force attack against an access point's WiFi Protected Setup pin number
Group: Applications/Security
Vendor: openmamba
Distribution: openmamba
Packager: Silvan Calarco <silvan.calarco@mambasoft.it>
URL: https://code.google.com/p/reaver-wps/
Source: https://reaver-wps.googlecode.com/files/reaver-%{version}.tar.gz
License: GPL
## AUTOBUILDREQ-BEGIN
BuildRequires: glibc-devel
BuildRequires: libpcap-devel
BuildRequires: libsqlite-devel
## AUTOBUILDREQ-END
BuildRoot: %{_tmppath}/%{name}-%{version}-root
%description
Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number.
Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured.
While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.
%debug_package
%prep
%setup -q
%build
cd src
%configure
%make
%install
[ "%{buildroot}" != / ] && rm -rf "%{buildroot}"
cd src
install -d -m0755 %{buildroot}%{_sysconfdir}/reaver
install -d -m0755 %{buildroot}%{_bindir}/
install -D -m0644 reaver.db %{buildroot}%{_sysconfdir}/reaver/reaver.db
install -D -m0755 reaver %{buildroot}%{_bindir}/reaver
install -D -m0755 wash %{buildroot}%{_bindir}/wash
%clean
[ "%{buildroot}" != / ] && rm -rf "%{buildroot}"
%files
%defattr(-,root,root)
%{_sysconfdir}/reaver/reaver.db
%{_bindir}/reaver
%{_bindir}/wash
%changelog
* Thu Aug 21 2014 Silvan Calarco <silvan.calarco@mambasoft.it> 1.4-1mamba
- package created using the webbuild interface