hcxdmptool: update to 6.3.2
[feed/packages.git] / net / hcxdumptool / Makefile
1 #
2 # Copyright (C) 2019 Andreas Nilsen <adde88@gmail.com>
3 #
4 # This is free software, licensed under the GNU General Public License v2.
5 # See /LICENSE for more information.
6 #
7
8 include $(TOPDIR)/rules.mk
9
10 PKG_NAME:=hcxdumptool
11 PKG_VERSION:=6.3.2
12 PKG_RELEASE:=1
13
14 PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
15 PKG_SOURCE_URL:=https://codeload.github.com/zerbea/hcxdumptool/tar.gz/$(PKG_VERSION)?
16 PKG_HASH:=1f6fe2b4757a5f20adeb6cc469693b4d0e8c49ba290450e10a37699d9f9a2a42
17
18 PKG_MAINTAINER:=Andreas Nilsen <adde88@gmail.com>
19 PKG_LICENSE:=MIT
20 PKG_LICENSE_FILES:=license.txt
21
22 include $(INCLUDE_DIR)/package.mk
23
24 define Package/hcxdumptool
25 SECTION:=net
26 CATEGORY:=Network
27 DEPENDS:=+libpcap +libopenssl
28 TITLE:=hcxdumptool
29 URL:=https://github.com/ZerBea/hcxdumptool
30 SUBMENU:=Wireless
31 endef
32
33 define Package/hcxdumptool/description
34 Small tool to capture packets from wlan devices. After capturing, upload
35 the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
36 to see if your ap or the client is vulnerable by using common wordlists.
37 Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
38 and check if wlan-key or plainmasterkey was transmitted unencrypted.
39 endef
40
41 define Build/Compile
42 $(MAKE) -C $(PKG_BUILD_DIR)/ \
43 $(TARGET_CONFIGURE_OPTS) \
44 CFLAGS="$(TARGET_CFLAGS)"
45 endef
46
47 define Package/hcxdumptool/install
48 $(INSTALL_DIR) $(1)/usr/sbin
49 $(INSTALL_BIN) $(PKG_BUILD_DIR)/hcxdumptool $(1)/usr/sbin/
50 endef
51
52 $(eval $(call BuildPackage,hcxdumptool))