Date: Thu, 24 Aug 2006 16:24:29 +0400 (MSD) From: Anton Karpov <toxa@toxahost.ru> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/102476: NEW PORT: net-mgmt/weplab Message-ID: <20060824122429.DBF7878EA1@mail.ank-pki.ru> Resent-Message-ID: <200608241230.k7OCULBX053907@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 102476 >Category: ports >Synopsis: NEW PORT: net-mgmt/weplab >Confidential: yes >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Thu Aug 24 12:30:20 GMT 2006 >Closed-Date: >Last-Modified: >Originator: Anton Karpov >Release: FreeBSD 7.0-CURRENT i386 >Organization: >Environment: FreeBSD laptoxa.toxa.lan 7.0-CURRENT FreeBSD 7.0-CURRENT #0: Sat Aug 19 03:29:04 MSD 2006 root@laptoxa.toxa.lan:/usr/obj/usr/src/sys/LAPTOXA i386 >Description: weplab is a well known tool for cracking WEP keys in an educational purposes. it compiles and run on FreeBSD smoothly, so I wonder why it's still not in ports. Although I doubt net-mgmt is the best place for such a ports, we already have aircrack with similar functionality in net-mgmt, so let weplab be there too. >How-To-Repeat: >Fix: Here I have weplab.shar for your pleasure --- weplab.shar begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # . # ./Makefile # ./distinfo # ./pkg-descr # echo c - . mkdir -p . > /dev/null 2>&1 echo x - ./Makefile sed 's/^X//' >./Makefile << 'END-of-./Makefile' X# New ports collection makefile for: weplab X# Date created: 24 Aug 2006 X# Whom: Anton Karpov <toxa@toxahost.ru> X# X# $FreeBSD$ X# X XPORTNAME= weplab XPORTVERSION= 0.1.5 XCATEGORIES= net-mgmt XMASTER_SITES= ${MASTER_SITE_SOURCEFORGE} XMASTER_SITE_SUBDIR= ${PORTNAME} X XMAINTAINER= toxa@toxahost.ru XCOMMENT= WepLab is a tool designed to teach how WEP works X XGNU_CONFIGURE= yes XMAN1= weplab.1 XMANCOMPRESSED= no XPLIST_FILES= bin/weplab X X.include <bsd.port.mk> END-of-./Makefile echo x - ./distinfo sed 's/^X//' >./distinfo << 'END-of-./distinfo' XMD5 (weplab-0.1.5.tar.gz) = 713870965447b0b8b7341409968846fb XSHA256 (weplab-0.1.5.tar.gz) = 91e4425f474d5b3213effc6d532aa3ee2fb121a1942e43c08210780a4759a72b XSIZE (weplab-0.1.5.tar.gz) = 122053 END-of-./distinfo echo x - ./pkg-descr sed 's/^X//' >./pkg-descr << 'END-of-./pkg-descr' XWepLab is a tool designed to teach how WEP works, what different Xvulnerabilities it has, and how they can be used in practice to Xbreak a WEP protected wireless network. So far, WepLab more than Xa Wep Key Cracker, is a Wep Security Analyzer designed from an Xeducational point of view. X XWWW: http://weplab.sourceforge.net END-of-./pkg-descr exit --- weplab.shar ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060824122429.DBF7878EA1>