You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
29 lines
917 B
29 lines
917 B
4 years ago
|
Source-Makefile: feeds/packages/net/hcxdumptool/Makefile
|
||
|
|
||
|
Package: hcxdumptool
|
||
|
Submenu: Wireless
|
||
|
Version: 6.0.1-1
|
||
|
Depends: +libc +GCC_LIBSSP:libssp +USE_GLIBC:librt +USE_GLIBC:libpthread +libpcap +libopenssl
|
||
|
Conflicts:
|
||
|
Menu-Depends:
|
||
|
Provides:
|
||
|
Section: net
|
||
|
Category: Network
|
||
|
Repository: base
|
||
|
Title: hcxdumptool
|
||
|
Maintainer: Andreas Nilsen <adde88@gmail.com>
|
||
|
Source: hcxdumptool-6.0.1.tar.gz
|
||
|
License: MIT
|
||
|
LicenseFiles: license.txt
|
||
|
Type: ipkg
|
||
|
Description: Small tool to capture packets from wlan devices. After capturing, upload
|
||
|
the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
|
||
|
to see if your ap or the client is vulnerable by using common wordlists.
|
||
|
Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
|
||
|
and check if wlan-key or plainmasterkey was transmitted unencrypted.
|
||
|
https://github.com/ZerBea/hcxdumptool
|
||
|
Andreas Nilsen <adde88@gmail.com>
|
||
|
@@
|
||
|
|
||
|
|