# # Copyright (C) 2019 Andreas Nilsen # # This is free software, licensed under the GNU General Public License v2. # See /LICENSE for more information. # include $(TOPDIR)/rules.mk PKG_NAME:=hcxdumptool PKG_VERSION:=6.2.4 PKG_RELEASE:=$(AUTORELEASE) PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz PKG_SOURCE_URL:=https://codeload.github.com/zerbea/hcxdumptool/tar.gz/$(PKG_VERSION)? PKG_HASH:=cadeb4b2f00da3a1df65cb53080e134f201ef73825d35049110764faf699028d PKG_MAINTAINER:=Andreas Nilsen PKG_LICENSE:=MIT PKG_LICENSE_FILES:=license.txt include $(INCLUDE_DIR)/package.mk define Package/hcxdumptool SECTION:=net CATEGORY:=Network DEPENDS:=+libpcap +libopenssl TITLE:=hcxdumptool URL:=https://github.com/ZerBea/hcxdumptool SUBMENU:=Wireless endef define Package/hcxdumptool/description Small tool to capture packets from wlan devices. After capturing, upload the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit) to see if your ap or the client is vulnerable by using common wordlists. Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools) and check if wlan-key or plainmasterkey was transmitted unencrypted. endef define Build/Compile $(MAKE) -C $(PKG_BUILD_DIR)/ \ $(TARGET_CONFIGURE_OPTS) \ CFLAGS="$(TARGET_CFLAGS)" endef define Package/hcxdumptool/install $(INSTALL_DIR) $(1)/usr/sbin $(INSTALL_BIN) $(PKG_BUILD_DIR)/hcxdumptool $(1)/usr/sbin/ endef $(eval $(call BuildPackage,hcxdumptool))