aboutsummaryrefslogtreecommitdiff
path: root/network/reaver/README
diff options
context:
space:
mode:
Diffstat (limited to 'network/reaver/README')
-rw-r--r--network/reaver/README11
1 files changed, 11 insertions, 0 deletions
diff --git a/network/reaver/README b/network/reaver/README
new file mode 100644
index 0000000000000..c7d75af9effcb
--- /dev/null
+++ b/network/reaver/README
@@ -0,0 +1,11 @@
+Reaver implements a brute force attack against Wifi Protected Setup (WPS)
+registrar PINs in order to recover WPA/WPA2 passphrases, as described in
+http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
+
+Reaver has been designed to be a robust and practical attack against WPS, and
+has been tested against a wide variety of access points and WPS
+implementations.
+
+On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
+in 4-10 hours, depending on the AP. In practice, it will generally take half
+this time to guess the correct WPS pin and recover the passphrase.