[Bug 530806] New: Review Request: Pyrit - A GPGPU-driven WPA-PSK key cracker

bugzilla at redhat.com bugzilla at redhat.com
Sun Oct 25 11:16:40 UTC 2009


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.

Summary: Review Request: Pyrit - A GPGPU-driven WPA-PSK key cracker

https://bugzilla.redhat.com/show_bug.cgi?id=530806

           Summary: Review Request: Pyrit - A GPGPU-driven WPA-PSK key
                    cracker
           Product: Fedora
           Version: rawhide
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: medium
          Priority: low
         Component: Package Review
        AssignedTo: nobody at fedoraproject.org
        ReportedBy: knabberknusperhaus at yahoo.de
         QAContact: extras-qa at fedoraproject.org
                CC: notting at redhat.com, fedora-package-review at redhat.com
   Estimated Hours: 0.0
    Classification: Fedora


Spec URL: http://www.how-to-properly.com/fedora/pyrit.spec
SRPM URL: http://www.how-to-properly.com/fedora/pyrit-0.2.5-1.fc11.src.rpm
Description: Pyrit creates massive databases, pre-computing part of the
WPA/WPA2-PSK authentication phase in a space-time tradeoff. It exploits the
computational power of multiple cores and GPGPU-platforms through ATI-Stream,
Nvidia CUDA, OpenCL and VIA Padlock. It is a powerful attack against one of the
world's most used security-protocols


I'm the author of Pyrit and this is the follow-up to bug 491428. This is my
first fedora-package and I require a sponsor.

PLEASE NOTE that this is a non-final version of upcoming Pyrit 0.2.5 that I'd
like to submit for review ONLY. I've already made several changes to upstream
in order to fix errors and warnings by rpmlint;

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.




More information about the package-review mailing list