RECENT POSTS
- Introduction to FreeBSD Security Best Practices
- Working with Package Management in FreeBSD
- Understanding FreeBSD Security Advisories and Updates
- Troubleshooting Common System Administration Issues in FreeBSD
- Tips for Hardening FreeBSD to achieve System Protection
- Setting Up DHCP Server in FreeBSD
- Secure User and Group Management in FreeBSD Systems
- Secure Remote Access with SSH in FreeBSD
- Optimizing System Performance in FreeBSD
- Network Packet Capture with tcpdump in FreeBSD
- All posts ...
Do you have GDPR compliance issues ?
Check out Legiscope a GDPR compliance software, that will save you weeks of work, automating your documentation, the training of your teams and all processes you need to keep your organisation compliant with privacy regulations
Reaver
Jul 20, 2023
Reaver brute force attack against WPS (Wi-Fi Protected Setup)
Reaver implements a brute force attack against WPS Wi-Fi Protected Setup in order to recover WPA/WPA2 passphrases.
Reaver is intended for penetration testing only, and not for unauthorized access to protected computer networks. Reaver exploits the flaws of the WPS design.
The implementation is based on the paper https//sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
- Older
- Newer
Checkout these related ports:
- Zyre - Framework for proximity-based peer-to-peer applications
- Zsync - File transfer program
- Zmap - Internet scanner
- Zillion - Distributed computing project
- Zerotier - Network virtualization everywhere
- Zebra-server - Z39.50/SR server software
- Yptransitd - Replacement for nss_ldap
- Yggdrasil - Experimental end-to-end encrypted self-arranging IPv6 network
- Yconalyzer - TCP Traffic Analyzer
- Yazproxy - Powerful general purpose Z39.50/SRW/SRU proxy
- Yaz - Z39.50/SR client and API library
- Yaz++ - C++ toolkit for development of Z39.50v3 clients and servers
- Yate - Yet Another Telephony Engine
- Yaph - Yet Another Proxy Hunter (proxy scanner)
- Yami4 - Messaging library for distributed systems