File: control

package info (click to toggle)
reaver 1.6.6-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 2,704 kB
  • sloc: ansic: 55,722; makefile: 204; python: 70; sh: 58
file content (30 lines) | stat: -rw-r--r-- 1,131 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Source: reaver
Section: net
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders:
 Bartosz Fenski <fenio@debian.org>,
 Leandro Cunha <leandrocunha016@gmail.com>,
 Samuel Henrique <samueloph@debian.org>
Build-Depends:
 debhelper-compat (= 13),
 libpcap-dev,
 libsqlite3-dev
Standards-Version: 4.6.2
Rules-Requires-Root: no
Homepage: https://github.com/t6x/reaver-wps-fork-t6x
Vcs-Git: https://salsa.debian.org/pkg-security-team/reaver.git
Vcs-Browser: https://salsa.debian.org/pkg-security-team/reaver

Package: reaver
Architecture: any
Depends: ${shlibs:Depends}, ${misc:Depends}
Recommends: pixiewps
Suggests: aircrack-ng
Description: brute force attack tool against Wi-Fi Protected Setup PIN number
 Reaver performs a brute force attack against an access point's Wi-Fi
 Protected Setup pin number.
 Once the WPS pin is found, the WPA PSK can be recovered and alternately
 the AP's wireless settings can be reconfigured.
 This package also provides the Wash executable, an utility for identifying WPS
 enabled access points. See documentation in /usr/share/doc/reaver/README.WASH.