56 lines
1.6 KiB
RPMSpec
56 lines
1.6 KiB
RPMSpec
Name: reaver
|
|
Version: 1.4
|
|
Release: 1mamba
|
|
Summary: Performs a brute force attack against an access point's WiFi Protected Setup pin number
|
|
Group: Applications/Security
|
|
Vendor: openmamba
|
|
Distribution: openmamba
|
|
Packager: Silvan Calarco <silvan.calarco@mambasoft.it>
|
|
URL: https://code.google.com/p/reaver-wps/
|
|
Source: https://reaver-wps.googlecode.com/files/reaver-%{version}.tar.gz
|
|
License: GPL
|
|
## AUTOBUILDREQ-BEGIN
|
|
BuildRequires: glibc-devel
|
|
BuildRequires: libpcap-devel
|
|
BuildRequires: libsqlite-devel
|
|
## AUTOBUILDREQ-END
|
|
BuildRoot: %{_tmppath}/%{name}-%{version}-root
|
|
|
|
%description
|
|
Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number.
|
|
Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured.
|
|
While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.
|
|
|
|
%debug_package
|
|
|
|
%prep
|
|
%setup -q
|
|
|
|
%build
|
|
cd src
|
|
%configure
|
|
%make
|
|
|
|
%install
|
|
[ "%{buildroot}" != / ] && rm -rf "%{buildroot}"
|
|
cd src
|
|
install -d -m0755 %{buildroot}%{_sysconfdir}/reaver
|
|
install -d -m0755 %{buildroot}%{_bindir}/
|
|
|
|
install -D -m0644 reaver.db %{buildroot}%{_sysconfdir}/reaver/reaver.db
|
|
install -D -m0755 reaver %{buildroot}%{_bindir}/reaver
|
|
install -D -m0755 wash %{buildroot}%{_bindir}/wash
|
|
|
|
%clean
|
|
[ "%{buildroot}" != / ] && rm -rf "%{buildroot}"
|
|
|
|
%files
|
|
%defattr(-,root,root)
|
|
%{_sysconfdir}/reaver/reaver.db
|
|
%{_bindir}/reaver
|
|
%{_bindir}/wash
|
|
|
|
%changelog
|
|
* Thu Aug 21 2014 Silvan Calarco <silvan.calarco@mambasoft.it> 1.4-1mamba
|
|
- package created using the webbuild interface
|