gnu: Add hcxdumptool.

* gnu/packages/networking.scm (hcxdumptool): New variable.
This commit is contained in:
Pierre Neidhardt 2018-07-30 16:54:37 +02:00
parent 5bd3134e04
commit a87ee0e41c
No known key found for this signature in database
GPG key ID: 9BDCF497A4BBCC7F

View file

@ -2144,3 +2144,36 @@ (define-public hcxtools
"This package contains a small set of tools to capture and convert "This package contains a small set of tools to capture and convert
packets from wireless devices for use with hashcat or John the Ripper.") packets from wireless devices for use with hashcat or John the Ripper.")
(license license:expat)))) (license license:expat))))
(define-public hcxdumptool
(let* ((commit "f4799b5da82c5b030a6d99b02d1c1b9dc838ad36"))
(package
(name "hcxdumptool")
(version (git-version "0.0.0" "1" commit))
(home-page "https://github.com/ZerBea/hcxdumptool")
(source (origin
(method git-fetch)
(uri (git-reference
(url home-page)
(commit commit)))
(sha256
(base32
"0qlsin0rws9sshn12faq4spmd0ffzssal36s71vhv6gkhhga7abl"))
(file-name (git-file-name name version))))
(build-system gnu-build-system)
(arguments
`(#:make-flags (list "CC=gcc"
(string-append "INSTALLDIR=" (assoc-ref %outputs "out") "/bin"))
#:tests? #f ;no tests
#:phases
(modify-phases %standard-phases
(delete 'configure))))
(synopsis "Small tool to capture packets from wlan devices")
(description
"Small tool to capture packets from WLAN devices. After capturing,
upload the \"uncleaned\" cap to @url{https://wpa-sec.stanev.org/?submit} to
see if the access point or the client is vulnerable to a dictionary attack.
Convert the cap file to hccapx format and/or to WPA-PMKID-PBKDF2
hashline (16800) with @command{hcxpcaptool} from the @code{hcxtools} package
and check if the WLAN key or the master key was transmitted unencrypted.")
(license license:expat))))