2 # Copyright (C) 2019 Andreas Nilsen <adde88@gmail.com>
4 # This is free software, licensed under the GNU General Public License v2.
5 # See /LICENSE for more information.
8 include $(TOPDIR
)/rules.mk
14 PKG_SOURCE
:=$(PKG_NAME
)-$(PKG_VERSION
).
tar.gz
15 PKG_SOURCE_URL
:=https
://codeload.github.com
/zerbea
/hcxdumptool
/tar.gz
/$(PKG_VERSION
)?
16 PKG_HASH
:=6ac996a506cb312a5f1c5987f30a4a80c793993908750f69f2df51056f961269
18 PKG_MAINTAINER
:=Andreas Nilsen
<adde88@gmail.com
>
20 PKG_LICENSE_FILES
:=license.txt
22 include $(INCLUDE_DIR
)/package.mk
24 define Package
/hcxdumptool
29 URL
:=https
://github.com
/ZerBea
/hcxdumptool
33 define Package
/hcxdumptool
/description
34 Small tool to capture packets from wlan devices. After capturing
, upload
35 the
"uncleaned" cap here
(https
://wpa-sec.stanev.org
/?submit
)
36 to see if your ap or the client is vulnerable by using common wordlists.
37 Convert the cap to hccapx and
/or to WPA-PMKID-PBKDF2 hashline
(16800) with hcxpcaptool
(hcxtools
)
38 and
check if wlan-key or plainmasterkey was transmitted unencrypted.
42 $(MAKE
) -C
$(PKG_BUILD_DIR
)/ \
43 $(TARGET_CONFIGURE_OPTS
) \
44 CFLAGS
="$(TARGET_CFLAGS)"
47 define Package
/hcxdumptool
/install
48 $(INSTALL_DIR
) $(1)/sbin
49 $(INSTALL_BIN
) $(PKG_BUILD_DIR
)/hcxdumptool
$(1)/sbin
/
52 $(eval
$(call BuildPackage
,hcxdumptool
))