[Bug 530806] New: Review Request: Pyrit - A GPGPU-driven WPA-PSK key cracker
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: Review Request: Pyrit - A GPGPU-driven WPA-PSK key cracker
https://bugzilla.redhat.com/show_bug.cgi?id=530806
Summary: Review Request: Pyrit - A GPGPU-driven WPA-PSK key
cracker
Product: Fedora
Version: rawhide
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: low
Component: Package Review
AssignedTo: nobody(a)fedoraproject.org
ReportedBy: knabberknusperhaus(a)yahoo.de
QAContact: extras-qa(a)fedoraproject.org
CC: notting(a)redhat.com, fedora-package-review(a)redhat.com
Estimated Hours: 0.0
Classification: Fedora
Spec URL: http://www.how-to-properly.com/fedora/pyrit.spec
SRPM URL: http://www.how-to-properly.com/fedora/pyrit-0.2.5-1.fc11.src.rpm
Description: Pyrit creates massive databases, pre-computing part of the
WPA/WPA2-PSK authentication phase in a space-time tradeoff. It exploits the
computational power of multiple cores and GPGPU-platforms through ATI-Stream,
Nvidia CUDA, OpenCL and VIA Padlock. It is a powerful attack against one of the
world's most used security-protocols
I'm the author of Pyrit and this is the follow-up to bug 491428. This is my
first fedora-package and I require a sponsor.
PLEASE NOTE that this is a non-final version of upcoming Pyrit 0.2.5 that I'd
like to submit for review ONLY. I've already made several changes to upstream
in order to fix errors and warnings by rpmlint;
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
13 years, 1 month