[Bug 1573778] New: Review Request: pixiewps - tool for offline bruteforce WPS PIN

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1573778

            Bug ID: 1573778
           Summary: Review Request: pixiewps - tool for offline bruteforce
                    WPS PIN
           Product: Fedora
           Version: rawhide
         Component: Package Review
          Severity: medium
          Priority: medium
          Assignee: nobody@xxxxxxxxxxxxxxxxx
          Reporter: tomas.korb@xxxxxxxxx
        QA Contact: extras-qa@xxxxxxxxxxxxxxxxx
                CC: package-review@xxxxxxxxxxxxxxxxxxxxxxx



Spec URL: https://tkorbar.fedorapeople.org/pixiewps.spec
SRPM URL: https://tkorbar.fedorapeople.org/pixiewps-1.4.2-1.fc27.src.rpm
Description: Pixiewps is a tool written in C used to bruteforce offline the WPS
PIN exploiting the low or non-existing entropy of some software
implementations, the so-called "pixie-dust attack" discovered by Dominique
Bongard in summer 2014.
Fedora Account System Username: tkorbar
Koji build: https://koji.fedoraproject.org/koji/taskinfo?taskID=26721435

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are always notified about changes to this product and component
_______________________________________________
package-review mailing list -- package-review@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-review-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite Conditions]     [KDE Users]

  Powered by Linux