[Lunar-commits] CVS: moonbase/wifi/airsnort BUILD, NONE, 1.1 DEPENDS, NONE, 1.1 DETAILS, NONE, 1.1

Stefan Wold ratler at lunar-linux.org
Thu Feb 5 13:40:17 GMT 2004


Update of /var/cvs/lunar/moonbase/wifi/airsnort
In directory dbguin.lunar-linux.org:/tmp/cvs-serv6067

Added Files:
	BUILD DEPENDS DETAILS 
Log Message:
Moved airsnort to wifi section and updated the version

--- NEW FILE: BUILD ---
( 
echo CFLAGS:= $CFLAGS                   &&
echo OPTS:= $OPTS                       &&
set -x && #Let's show the logs what we've used for debug
         ./autogen.sh  --build=$BUILD            \
         --prefix=/usr             \
         --sysconfdir=/etc         \
         --localstatedir=/var      \
         --infodir=/usr/share/info \
         --mandir=/usr/share/man   \
         $OPTS                     &&
set +x      ##turn it off so that the logs stay readable
make			&&
prepare_install		&&
make install
) > $C_FIFO 2>&1

--- NEW FILE: DEPENDS ---
depends libpcap

--- NEW FILE: DETAILS ---
          MODULE=airsnort
         VERSION=0.2.3c
          SOURCE=airsnort-$VERSION.tar.gz
SOURCE_DIRECTORY=$BUILD_DIRECTORY/airsnort-$VERSION
   SOURCE_URL[0]=$SFORGE_URL/airsnort/$SOURCE
      SOURCE_VFY=md5:1b3634ebf10276ef722dd9525dd91337
        WEB_SITE=http://airsnort.shmoo.com/
         ENTERED=20030107
         UPDATED=20040205
      MAINTAINER=michalsc at email.uc.edu
           SHORT="AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys"
cat << EOF
AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 

802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in " Weaknesses in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack. 


AirSnort requires approximately 5-10 million encrypted packets to be gathered. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second. 
EOF



More information about the Lunar-commits mailing list