You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
28 lines
917 B
28 lines
917 B
Source-Makefile: feeds/packages/net/hcxdumptool/Makefile
|
|
|
|
Package: hcxdumptool
|
|
Submenu: Wireless
|
|
Version: 6.0.1-1
|
|
Depends: +libc +GCC_LIBSSP:libssp +USE_GLIBC:librt +USE_GLIBC:libpthread +libpcap +libopenssl
|
|
Conflicts:
|
|
Menu-Depends:
|
|
Provides:
|
|
Section: net
|
|
Category: Network
|
|
Repository: base
|
|
Title: hcxdumptool
|
|
Maintainer: Andreas Nilsen <adde88@gmail.com>
|
|
Source: hcxdumptool-6.0.1.tar.gz
|
|
License: MIT
|
|
LicenseFiles: license.txt
|
|
Type: ipkg
|
|
Description: Small tool to capture packets from wlan devices. After capturing, upload
|
|
the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
|
|
to see if your ap or the client is vulnerable by using common wordlists.
|
|
Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
|
|
and check if wlan-key or plainmasterkey was transmitted unencrypted.
|
|
https://github.com/ZerBea/hcxdumptool
|
|
Andreas Nilsen <adde88@gmail.com>
|
|
@@
|
|
|
|
|
|
|