You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

52 lines
1.5 KiB

  1. #
  2. # Copyright (C) 2019 Andreas Nilsen <adde88@gmail.com>
  3. #
  4. # This is free software, licensed under the GNU General Public License v2.
  5. # See /LICENSE for more information.
  6. #
  7. include $(TOPDIR)/rules.mk
  8. PKG_NAME:=hcxdumptool
  9. PKG_VERSION:=5.2.0
  10. PKG_RELEASE:=1
  11. PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
  12. PKG_SOURCE_URL:=https://codeload.github.com/zerbea/hcxdumptool/tar.gz/$(PKG_VERSION)?
  13. PKG_HASH:=9da9c8c20b93f6a0a262436a862e376bd3cfd05fb879efcf480ad962a14496c7
  14. PKG_MAINTAINER:=Andreas Nilsen <adde88@gmail.com>
  15. PKG_LICENSE:=MIT
  16. PKG_LICENSE_FILES:=license.txt
  17. include $(INCLUDE_DIR)/package.mk
  18. define Package/hcxdumptool
  19. SECTION:=net
  20. CATEGORY:=Network
  21. DEPENDS:=+libpcap
  22. TITLE:=hcxdumptool
  23. URL:=https://github.com/ZerBea/hcxdumptool
  24. SUBMENU:=Wireless
  25. endef
  26. define Package/hcxdumptool/description
  27. Small tool to capture packets from wlan devices. After capturing, upload
  28. the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
  29. to see if your ap or the client is vulnerable by using common wordlists.
  30. Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
  31. and check if wlan-key or plainmasterkey was transmitted unencrypted.
  32. endef
  33. define Build/Compile
  34. $(MAKE) -C $(PKG_BUILD_DIR)/ \
  35. $(TARGET_CONFIGURE_OPTS) \
  36. CFLAGS="$(TARGET_CFLAGS)"
  37. endef
  38. define Package/hcxdumptool/install
  39. $(INSTALL_DIR) $(1)/usr/sbin
  40. $(INSTALL_BIN) $(PKG_BUILD_DIR)/hcxdumptool $(1)/usr/sbin/
  41. endef
  42. $(eval $(call BuildPackage,hcxdumptool))