me
/
guix
Archived
1
0
Fork 0

gnu: hcxdumptool: Update to 5.1.4.

* gnu/packages/networking.scm (hcxdumptool): Update to 5.1.4.
master
Tobias Geerinckx-Rice 2019-04-26 00:58:16 +02:00
parent 03c443ce8f
commit 4f7db08571
No known key found for this signature in database
GPG Key ID: 0DB0FF884F556D79
1 changed files with 26 additions and 26 deletions

View File

@ -2244,37 +2244,37 @@ packets from wireless devices for use with hashcat or John the Ripper.")
(license license:expat)))
(define-public hcxdumptool
(let* ((commit "f4799b5da82c5b030a6d99b02d1c1b9dc838ad36"))
(package
(name "hcxdumptool")
(version (git-version "0.0.0" "1" commit))
(home-page "https://github.com/ZerBea/hcxdumptool")
(source (origin
(method git-fetch)
(uri (git-reference
(url home-page)
(commit commit)))
(sha256
(base32
"0qlsin0rws9sshn12faq4spmd0ffzssal36s71vhv6gkhhga7abl"))
(file-name (git-file-name name version))))
(build-system gnu-build-system)
(arguments
`(#:make-flags (list "CC=gcc"
(string-append "INSTALLDIR=" (assoc-ref %outputs "out") "/bin"))
#:tests? #f ;no tests
#:phases
(modify-phases %standard-phases
(delete 'configure))))
(synopsis "Small tool to capture packets from wlan devices")
(description
"Small tool to capture packets from WLAN devices. After capturing,
(package
(name "hcxdumptool")
(version "5.1.4")
(source
(origin
(method git-fetch)
(uri (git-reference
(url "https://github.com/ZerBea/hcxdumptool.git")
(commit version)))
(sha256
(base32 "0h2cc2dfpc83325hwqkxwn0p8qfq5gh1dg0yb1nr8bnffy0b4r4v"))
(file-name (git-file-name name version))))
(build-system gnu-build-system)
(arguments
`(#:make-flags
(list "CC=gcc"
(string-append "INSTALLDIR=" (assoc-ref %outputs "out") "/bin"))
#:tests? #f ; no test suite
#:phases
(modify-phases %standard-phases
(delete 'configure))))
(home-page "https://github.com/ZerBea/hcxdumptool")
(synopsis "Small tool to capture packets from wlan devices")
(description
"Small tool to capture packets from WLAN devices. After capturing,
upload the \"uncleaned\" cap to @url{https://wpa-sec.stanev.org/?submit} to
see if the access point or the client is vulnerable to a dictionary attack.
Convert the cap file to hccapx format and/or to WPA-PMKID-PBKDF2
hashline (16800) with @command{hcxpcaptool} from the @code{hcxtools} package
and check if the WLAN key or the master key was transmitted unencrypted.")
(license license:expat))))
(license license:expat)))
(define-public dante
(package