summaryrefslogtreecommitdiff
path: root/gnu/packages/networking.scm
diff options
context:
space:
mode:
authorTobias Geerinckx-Rice <me@tobias.gr>2019-04-26 00:58:16 +0200
committerTobias Geerinckx-Rice <me@tobias.gr>2019-04-26 00:58:16 +0200
commit4f7db085711431b277ea7e1ba2a806751a84cd20 (patch)
tree7973dc6cb3535eace776cd1c21f83c6726b3d5bf /gnu/packages/networking.scm
parent03c443ce8f472a6a27d939b1106404c9245f9a12 (diff)
downloadpatches-4f7db085711431b277ea7e1ba2a806751a84cd20.tar
patches-4f7db085711431b277ea7e1ba2a806751a84cd20.tar.gz
gnu: hcxdumptool: Update to 5.1.4.
* gnu/packages/networking.scm (hcxdumptool): Update to 5.1.4.
Diffstat (limited to 'gnu/packages/networking.scm')
-rw-r--r--gnu/packages/networking.scm52
1 files changed, 26 insertions, 26 deletions
diff --git a/gnu/packages/networking.scm b/gnu/packages/networking.scm
index 329b97c3d4..2bd12301f3 100644
--- a/gnu/packages/networking.scm
+++ b/gnu/packages/networking.scm
@@ -2244,37 +2244,37 @@ packets from wireless devices for use with hashcat or John the Ripper.")
(license license:expat)))
(define-public hcxdumptool
- (let* ((commit "f4799b5da82c5b030a6d99b02d1c1b9dc838ad36"))
- (package
- (name "hcxdumptool")
- (version (git-version "0.0.0" "1" commit))
- (home-page "https://github.com/ZerBea/hcxdumptool")
- (source (origin
- (method git-fetch)
- (uri (git-reference
- (url home-page)
- (commit commit)))
- (sha256
- (base32
- "0qlsin0rws9sshn12faq4spmd0ffzssal36s71vhv6gkhhga7abl"))
- (file-name (git-file-name name version))))
- (build-system gnu-build-system)
- (arguments
- `(#:make-flags (list "CC=gcc"
- (string-append "INSTALLDIR=" (assoc-ref %outputs "out") "/bin"))
- #:tests? #f ;no tests
- #:phases
- (modify-phases %standard-phases
- (delete 'configure))))
- (synopsis "Small tool to capture packets from wlan devices")
- (description
- "Small tool to capture packets from WLAN devices. After capturing,
+ (package
+ (name "hcxdumptool")
+ (version "5.1.4")
+ (source
+ (origin
+ (method git-fetch)
+ (uri (git-reference
+ (url "https://github.com/ZerBea/hcxdumptool.git")
+ (commit version)))
+ (sha256
+ (base32 "0h2cc2dfpc83325hwqkxwn0p8qfq5gh1dg0yb1nr8bnffy0b4r4v"))
+ (file-name (git-file-name name version))))
+ (build-system gnu-build-system)
+ (arguments
+ `(#:make-flags
+ (list "CC=gcc"
+ (string-append "INSTALLDIR=" (assoc-ref %outputs "out") "/bin"))
+ #:tests? #f ; no test suite
+ #:phases
+ (modify-phases %standard-phases
+ (delete 'configure))))
+ (home-page "https://github.com/ZerBea/hcxdumptool")
+ (synopsis "Small tool to capture packets from wlan devices")
+ (description
+ "Small tool to capture packets from WLAN devices. After capturing,
upload the \"uncleaned\" cap to @url{https://wpa-sec.stanev.org/?submit} to
see if the access point or the client is vulnerable to a dictionary attack.
Convert the cap file to hccapx format and/or to WPA-PMKID-PBKDF2
hashline (16800) with @command{hcxpcaptool} from the @code{hcxtools} package
and check if the WLAN key or the master key was transmitted unencrypted.")
- (license license:expat))))
+ (license license:expat)))
(define-public dante
(package