[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
04/04: gnu: Add hcxdumptool.
From: |
Pierre Neidhardt |
Subject: |
04/04: gnu: Add hcxdumptool. |
Date: |
Tue, 14 Aug 2018 06:00:25 -0400 (EDT) |
ambrevar pushed a commit to branch master
in repository guix.
commit a87ee0e41cb840ec6b5c58cca1e1598b770cef24
Author: Pierre Neidhardt <address@hidden>
Date: Mon Jul 30 16:54:37 2018 +0200
gnu: Add hcxdumptool.
* gnu/packages/networking.scm (hcxdumptool): New variable.
---
gnu/packages/networking.scm | 33 +++++++++++++++++++++++++++++++++
1 file changed, 33 insertions(+)
diff --git a/gnu/packages/networking.scm b/gnu/packages/networking.scm
index 5d71494..371a935 100644
--- a/gnu/packages/networking.scm
+++ b/gnu/packages/networking.scm
@@ -2144,3 +2144,36 @@ Ethernet and TAP interfaces is supported. Packet
capture is also supported.")
"This package contains a small set of tools to capture and convert
packets from wireless devices for use with hashcat or John the Ripper.")
(license license:expat))))
+
+(define-public hcxdumptool
+ (let* ((commit "f4799b5da82c5b030a6d99b02d1c1b9dc838ad36"))
+ (package
+ (name "hcxdumptool")
+ (version (git-version "0.0.0" "1" commit))
+ (home-page "https://github.com/ZerBea/hcxdumptool")
+ (source (origin
+ (method git-fetch)
+ (uri (git-reference
+ (url home-page)
+ (commit commit)))
+ (sha256
+ (base32
+ "0qlsin0rws9sshn12faq4spmd0ffzssal36s71vhv6gkhhga7abl"))
+ (file-name (git-file-name name version))))
+ (build-system gnu-build-system)
+ (arguments
+ `(#:make-flags (list "CC=gcc"
+ (string-append "INSTALLDIR=" (assoc-ref %outputs
"out") "/bin"))
+ #:tests? #f ;no tests
+ #:phases
+ (modify-phases %standard-phases
+ (delete 'configure))))
+ (synopsis "Small tool to capture packets from wlan devices")
+ (description
+ "Small tool to capture packets from WLAN devices. After capturing,
+upload the \"uncleaned\" cap to @url{https://wpa-sec.stanev.org/?submit} to
+see if the access point or the client is vulnerable to a dictionary attack.
+Convert the cap file to hccapx format and/or to WPA-PMKID-PBKDF2
+hashline (16800) with @command{hcxpcaptool} from the @code{hcxtools} package
+and check if the WLAN key or the master key was transmitted unencrypted.")
+ (license license:expat))))