|
|
- #
- # Copyright (C) 2019 Andreas Nilsen <adde88@gmail.com>
- #
- # This is free software, licensed under the GNU General Public License v2.
- # See /LICENSE for more information.
- #
-
- include $(TOPDIR)/rules.mk
-
- PKG_NAME:=hcxdumptool
- PKG_VERSION:=6.0.1
- PKG_RELEASE:=1
-
- PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
- PKG_SOURCE_URL:=https://codeload.github.com/zerbea/hcxdumptool/tar.gz/$(PKG_VERSION)?
- PKG_HASH:=32bc07b692f5682792dcfd1d5dcae749e5fed4a65a2a05d815ed59adc9b64b02
-
- PKG_MAINTAINER:=Andreas Nilsen <adde88@gmail.com>
- PKG_LICENSE:=MIT
- PKG_LICENSE_FILES:=license.txt
-
- include $(INCLUDE_DIR)/package.mk
-
- define Package/hcxdumptool
- SECTION:=net
- CATEGORY:=Network
- DEPENDS:=+libpcap +libopenssl
- TITLE:=hcxdumptool
- URL:=https://github.com/ZerBea/hcxdumptool
- SUBMENU:=Wireless
- endef
-
- define Package/hcxdumptool/description
- Small tool to capture packets from wlan devices. After capturing, upload
- the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
- to see if your ap or the client is vulnerable by using common wordlists.
- Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
- and check if wlan-key or plainmasterkey was transmitted unencrypted.
- endef
-
- define Build/Compile
- $(MAKE) -C $(PKG_BUILD_DIR)/ \
- $(TARGET_CONFIGURE_OPTS) \
- CFLAGS="$(TARGET_CFLAGS)"
- endef
-
- define Package/hcxdumptool/install
- $(INSTALL_DIR) $(1)/usr/sbin
- $(INSTALL_BIN) $(PKG_BUILD_DIR)/hcxdumptool $(1)/usr/sbin/
- endef
-
- $(eval $(call BuildPackage,hcxdumptool))
|