gnu: Add hcxdumptool.

* gnu/packages/networking.scm (hcxdumptool): New variable.
This commit is contained in:
Pierre Neidhardt 2018-07-30 16:54:37 +02:00
parent 5bd3134e04
commit a87ee0e41c
No known key found for this signature in database
GPG key ID: 9BDCF497A4BBCC7F

View file

@ -2144,3 +2144,36 @@ (define-public hcxtools
"This package contains a small set of tools to capture and convert
packets from wireless devices for use with hashcat or John the Ripper.")
(license license:expat))))
(define-public hcxdumptool
(let* ((commit "f4799b5da82c5b030a6d99b02d1c1b9dc838ad36"))
(package
(name "hcxdumptool")
(version (git-version "0.0.0" "1" commit))
(home-page "https://github.com/ZerBea/hcxdumptool")
(source (origin
(method git-fetch)
(uri (git-reference
(url home-page)
(commit commit)))
(sha256
(base32
"0qlsin0rws9sshn12faq4spmd0ffzssal36s71vhv6gkhhga7abl"))
(file-name (git-file-name name version))))
(build-system gnu-build-system)
(arguments
`(#:make-flags (list "CC=gcc"
(string-append "INSTALLDIR=" (assoc-ref %outputs "out") "/bin"))
#:tests? #f ;no tests
#:phases
(modify-phases %standard-phases
(delete 'configure))))
(synopsis "Small tool to capture packets from wlan devices")
(description
"Small tool to capture packets from WLAN devices. After capturing,
upload the \"uncleaned\" cap to @url{https://wpa-sec.stanev.org/?submit} to
see if the access point or the client is vulnerable to a dictionary attack.
Convert the cap file to hccapx format and/or to WPA-PMKID-PBKDF2
hashline (16800) with @command{hcxpcaptool} from the @code{hcxtools} package
and check if the WLAN key or the master key was transmitted unencrypted.")
(license license:expat))))