Date: Wed, 2 Dec 2015 17:23:32 +0000 (UTC) From: Mark Felder <feld@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r402839 - in head/security: . pixiewps Message-ID: <201512021723.tB2HNWY2055798@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: feld Date: Wed Dec 2 17:23:32 2015 New Revision: 402839 URL: https://svnweb.freebsd.org/changeset/ports/402839 Log: Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some APs (pixie dust attack). It is meant for educational purposes only. All credits for the research go to Dominique Bongard. WWW: https://github.com/wiire/pixiewps PR: 204030 Submitted by: Franz Bettag <franz@bett.ag> Added: head/security/pixiewps/ head/security/pixiewps/Makefile (contents, props changed) head/security/pixiewps/distinfo (contents, props changed) head/security/pixiewps/pkg-descr (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Wed Dec 2 17:11:37 2015 (r402838) +++ head/security/Makefile Wed Dec 2 17:23:32 2015 (r402839) @@ -761,6 +761,7 @@ SUBDIR += pinentry-gtk2 SUBDIR += pinentry-qt4 SUBDIR += pinentry-tty + SUBDIR += pixiewps SUBDIR += pkcrack SUBDIR += pkcs11-dump SUBDIR += pkcs11-gateway Added: head/security/pixiewps/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/pixiewps/Makefile Wed Dec 2 17:23:32 2015 (r402839) @@ -0,0 +1,28 @@ +# Created by: Franz Bettag <franz@bett.ag> +# $FreeBSD$ + +PORTNAME= pixiewps +PORTVERSION= 1.1 +CATEGORIES= security +MASTER_SITES= https://github.com/wiire/pixiewps/ + +MAINTAINER= franz@bett.ag +COMMENT= Offline WPS bruteforce utility + +LICENSE= GPLv3 + +USE_GITHUB= yes +GH_ACCOUNT= wiire +GH_TAGNAME= 08a78c3c + +USE_OPENSSL= yes + +USES= gmake +WRKSRC_SUBDIR= src/ + +PLIST_FILES= bin/pixiewps + +do-install: + ${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin + +.include <bsd.port.mk> Added: head/security/pixiewps/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/pixiewps/distinfo Wed Dec 2 17:23:32 2015 (r402839) @@ -0,0 +1,2 @@ +SHA256 (wiire-pixiewps-1.1-08a78c3c_GH0.tar.gz) = 16b65e4fc376b3812135f83b450c9e286ef12c872ac91b048710e3e442d44e75 +SIZE (wiire-pixiewps-1.1-08a78c3c_GH0.tar.gz) = 28836 Added: head/security/pixiewps/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/pixiewps/pkg-descr Wed Dec 2 17:23:32 2015 (r402839) @@ -0,0 +1,6 @@ +Pixiewps is a tool written in C used to bruteforce offline the WPS pin +exploiting the low or non-existing entropy of some APs (pixie dust attack). +It is meant for educational purposes only. +All credits for the research go to Dominique Bongard. + +WWW: https://github.com/wiire/pixiewps
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201512021723.tB2HNWY2055798>