Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 2 Dec 2015 17:23:32 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r402839 - in head/security: . pixiewps
Message-ID:  <201512021723.tB2HNWY2055798@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Wed Dec  2 17:23:32 2015
New Revision: 402839
URL: https://svnweb.freebsd.org/changeset/ports/402839

Log:
  Pixiewps is a tool written in C used to bruteforce offline the WPS pin
  exploiting the low or non-existing entropy of some APs (pixie dust attack).
  It is meant for educational purposes only.
  All credits for the research go to Dominique Bongard.
  
  WWW: https://github.com/wiire/pixiewps
  
  PR:		204030
  Submitted by:	Franz Bettag <franz@bett.ag>

Added:
  head/security/pixiewps/
  head/security/pixiewps/Makefile   (contents, props changed)
  head/security/pixiewps/distinfo   (contents, props changed)
  head/security/pixiewps/pkg-descr   (contents, props changed)
Modified:
  head/security/Makefile

Modified: head/security/Makefile
==============================================================================
--- head/security/Makefile	Wed Dec  2 17:11:37 2015	(r402838)
+++ head/security/Makefile	Wed Dec  2 17:23:32 2015	(r402839)
@@ -761,6 +761,7 @@
     SUBDIR += pinentry-gtk2
     SUBDIR += pinentry-qt4
     SUBDIR += pinentry-tty
+    SUBDIR += pixiewps
     SUBDIR += pkcrack
     SUBDIR += pkcs11-dump
     SUBDIR += pkcs11-gateway

Added: head/security/pixiewps/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/pixiewps/Makefile	Wed Dec  2 17:23:32 2015	(r402839)
@@ -0,0 +1,28 @@
+# Created by: Franz Bettag <franz@bett.ag>
+# $FreeBSD$
+
+PORTNAME=	pixiewps
+PORTVERSION=	1.1
+CATEGORIES=	security
+MASTER_SITES=	https://github.com/wiire/pixiewps/
+
+MAINTAINER=	franz@bett.ag
+COMMENT=	Offline WPS bruteforce utility
+
+LICENSE=	GPLv3
+
+USE_GITHUB=	yes
+GH_ACCOUNT=	wiire
+GH_TAGNAME=	08a78c3c
+
+USE_OPENSSL=	yes
+
+USES=	gmake
+WRKSRC_SUBDIR=	src/
+
+PLIST_FILES=	bin/pixiewps
+
+do-install:
+	${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin
+
+.include <bsd.port.mk>

Added: head/security/pixiewps/distinfo
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/pixiewps/distinfo	Wed Dec  2 17:23:32 2015	(r402839)
@@ -0,0 +1,2 @@
+SHA256 (wiire-pixiewps-1.1-08a78c3c_GH0.tar.gz) = 16b65e4fc376b3812135f83b450c9e286ef12c872ac91b048710e3e442d44e75
+SIZE (wiire-pixiewps-1.1-08a78c3c_GH0.tar.gz) = 28836

Added: head/security/pixiewps/pkg-descr
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/pixiewps/pkg-descr	Wed Dec  2 17:23:32 2015	(r402839)
@@ -0,0 +1,6 @@
+Pixiewps is a tool written in C used to bruteforce offline the WPS pin
+exploiting the low or non-existing entropy of some APs (pixie dust attack).
+It is meant for educational purposes only. 
+All credits for the research go to Dominique Bongard.
+
+WWW: https://github.com/wiire/pixiewps



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201512021723.tB2HNWY2055798>