Эх сурвалжийг харах

–[PACKAGES] update hcx tools to 6.2.7

DSR! 3 жил өмнө
parent
commit
fdb4a9f04c

+ 19 - 36
packages/mips_24kc/Packages

@@ -117,62 +117,45 @@ Size: 57153
 SHA256sum: 6f79d3af6d988d481ad3dce8873dda1189768334bd7c839f6905d061923310ec
 SHA256sum: 6f79d3af6d988d481ad3dce8873dda1189768334bd7c839f6905d061923310ec
 
 
 Package: hcxdumptool-custom
 Package: hcxdumptool-custom
-Version: 6.2.5-8
+Version: 6.2.7
 Depends: libc, libpcap1, libopenssl1.1
 Depends: libc, libpcap1, libopenssl1.1
 License: MIT
 License: MIT
 Section: net
 Section: net
 Architecture: mips_24kc
 Architecture: mips_24kc
-Installed-Size: 59828
+Installed-Size: 61069
 Description:  Small tool to capture packets from wlan devices. After capturing, upload
 Description:  Small tool to capture packets from wlan devices. After capturing, upload
  the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
  the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
  to see if your ap or the client is vulnerable by using common wordlists.
  to see if your ap or the client is vulnerable by using common wordlists.
  Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
  Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
  and check if wlan-key or plainmasterkey was transmitted unencrypted.
  and check if wlan-key or plainmasterkey was transmitted unencrypted.
-Filename: hcxdumptool-custom_6.2.5-8_mips_24kc.ipk
-Size: 60768
-SHA256sum: f9e0b4ba241eb033ab955037a180630e0dd185b2f8427260dd2ca71af3504b96
+Filename: hcxdumptool-custom_6.2.7_mips_24kc.ipk
+Size: 62018
+SHA256sum: 9159205c720f74baafdfca9449b01f6a284d6de10981193457a35b65f16042c0
 
 
 Package: hcxlabtools
 Package: hcxlabtools
-Version: 6.2.5-8
+Version: 6.2.7
 Depends: libc, libpcap1, libopenssl1.1
 Depends: libc, libpcap1, libopenssl1.1
 License: MIT
 License: MIT
 Section: net
 Section: net
 Architecture: mips_24kc
 Architecture: mips_24kc
-Installed-Size: 92530
-Description:  Small tool to capture packets from wlan devices. After capturing, upload
- the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
- to see if your ap or the client is vulnerable by using common wordlists.
- Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
- and check if wlan-key or plainmasterkey was transmitted unencrypted.
-Filename: hcxlabtools_6.2.5-8_mips_24kc.ipk
-Size: 91505
-SHA256sum: 67e12c2a9ec6edd9c46969a545a6785dd90a3326fef705d9d9c2f9d9c1be4872
+Installed-Size: 104387
+Description:  Skeleton to test WiFi adapters and to understand 802.11 protocol. 
+Filename: hcxlabtools_6.2.7_mips_24kc.ipk
+Size: 103343
+SHA256sum: 3726a9a05504816d4533145d9a621a8e243d2b5c0b5a3e8339b653e448c5262c
 
 
 Package: hcxtools-custom
 Package: hcxtools-custom
-Version: 6.2.5-8
-Depends: libc, libpcap1, libopenssl1.1, libpthread, zlib, libcurl4, python3-light
+Version: 6.2.7
+Depends: libc, libpthread, zlib, libcurl4, libpcap1, libopenssl1.1
 License: MIT
 License: MIT
 Section: net
 Section: net
 Architecture: mips_24kc
 Architecture: mips_24kc
-Installed-Size: 141276
-Description:  Set of tools convert packets from captures (h = hash, c = capture, convert and calculate candidates, x = different hashtypes)
- for the use with latest hashcat or John the Ripper.
-Filename: hcxtools-custom_6.2.5-8_mips_24kc.ipk
-Size: 140834
-SHA256sum: 8849cfbe2461e626a07d5654fd1a2efcc91a383ad10eb171efe886342750d1ae
-
-Package: hcxtools-full
-Version: 6.2.5-8
-Depends: libc, libpcap1, libopenssl1.1, libpthread, zlib, libcurl4, python3-light
-License: MIT
-Section: net
-Architecture: mips_24kc
-Installed-Size: 105
-Description:  This package includes all the tools made by @ZerBea
- Tools: hcxtools, hcxdumptool, and wifi_laboratory (hcxlabtools)
-Filename: hcxtools-full_6.2.5-8_mips_24kc.ipk
-Size: 929
-SHA256sum: 2fe3f8c9c40de22ffbc1b0588ebd2e5150f12a39972a258d2b3fce5784efa79d
+Installed-Size: 141862
+Description:  Portable solution for conversion of cap/pcap/pcapng (gz compressed) WiFi dump files to hashcat formats
+ and to John the Ripper formats. hcx: h = hash, c = convert and calculate candidates, x = different hashtypes
+Filename: hcxtools-custom_6.2.7_mips_24kc.ipk
+Size: 141198
+SHA256sum: bae3d30ae3b3117f2ab57578cb5217af782bc95a1afe82d614d5dcad20a41f9b
 
 
 Package: hostapd-mana
 Package: hostapd-mana
 Version: 2.6.5-27
 Version: 2.6.5-27

BIN
packages/mips_24kc/Packages.gz


BIN
packages/mips_24kc/hcxdumptool-custom_6.2.5-8_mips_24kc.ipk


BIN
packages/mips_24kc/hcxdumptool-custom_6.2.7_mips_24kc.ipk


BIN
packages/mips_24kc/hcxlabtools_6.2.5-8_mips_24kc.ipk


BIN
packages/mips_24kc/hcxlabtools_6.2.7_mips_24kc.ipk


BIN
packages/mips_24kc/hcxtools-custom_6.2.5-8_mips_24kc.ipk


BIN
packages/mips_24kc/hcxtools-custom_6.2.7_mips_24kc.ipk


BIN
packages/mips_24kc/hcxtools-full_6.2.5-8_mips_24kc.ipk


+ 19 - 36
packages/mipsel_24kc/Packages

@@ -76,62 +76,45 @@ Size: 7984
 SHA256sum: fd5a88daad8f2c681563205b65d43c770d604b6bac32036672d5bde4bd45e6a5
 SHA256sum: fd5a88daad8f2c681563205b65d43c770d604b6bac32036672d5bde4bd45e6a5
 
 
 Package: hcxdumptool-custom
 Package: hcxdumptool-custom
-Version: 6.2.5-3
+Version: 6.2.7
 Depends: libc, libpcap1, libopenssl1.1
 Depends: libc, libpcap1, libopenssl1.1
 License: MIT
 License: MIT
 Section: net
 Section: net
 Architecture: mipsel_24kc
 Architecture: mipsel_24kc
-Installed-Size: 58176
+Installed-Size: 60486
 Description:  Small tool to capture packets from wlan devices. After capturing, upload
 Description:  Small tool to capture packets from wlan devices. After capturing, upload
  the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
  the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
  to see if your ap or the client is vulnerable by using common wordlists.
  to see if your ap or the client is vulnerable by using common wordlists.
  Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
  Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
  and check if wlan-key or plainmasterkey was transmitted unencrypted.
  and check if wlan-key or plainmasterkey was transmitted unencrypted.
-Filename: hcxdumptool-custom_6.2.5-3_mipsel_24kc.ipk
-Size: 59267
-SHA256sum: 44a21fcab7b31c4a241b02364422ef01f91555b1440534d2a65d32bb98762632
+Filename: hcxdumptool-custom_6.2.7_mipsel_24kc.ipk
+Size: 61535
+SHA256sum: fc5e561b8910e8423bf7bce8e7496b71503b3b516c01b220a8a6cff79fdbe069
 
 
 Package: hcxlabtools
 Package: hcxlabtools
-Version: 6.2.5-3
+Version: 6.2.7
 Depends: libc, libpcap1, libopenssl1.1
 Depends: libc, libpcap1, libopenssl1.1
 License: MIT
 License: MIT
 Section: net
 Section: net
 Architecture: mipsel_24kc
 Architecture: mipsel_24kc
-Installed-Size: 90337
-Description:  Small tool to capture packets from wlan devices. After capturing, upload
- the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit)
- to see if your ap or the client is vulnerable by using common wordlists.
- Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools)
- and check if wlan-key or plainmasterkey was transmitted unencrypted.
-Filename: hcxlabtools_6.2.5-3_mipsel_24kc.ipk
-Size: 89298
-SHA256sum: b3b90f077012ec22a57fdd23302202a9106bccd905729d23666f9841256f7f15
+Installed-Size: 103970
+Description:  Skeleton to test WiFi adapters and to understand 802.11 protocol. 
+Filename: hcxlabtools_6.2.7_mipsel_24kc.ipk
+Size: 102957
+SHA256sum: aff6fb360694a4c6cbd2450a3e63da3e0249995ff1a9a2988ac8f84c31019a08
 
 
 Package: hcxtools-custom
 Package: hcxtools-custom
-Version: 6.2.5-3
-Depends: libc, libpcap1, libopenssl1.1, libpthread, zlib, libcurl4, python3-light
-License: MIT
-Section: net
-Architecture: mipsel_24kc
-Installed-Size: 138403
-Description:  Set of tools convert packets from captures (h = hash, c = capture, convert and calculate candidates, x = different hashtypes)
- for the use with latest hashcat or John the Ripper.
-Filename: hcxtools-custom_6.2.5-3_mipsel_24kc.ipk
-Size: 138668
-SHA256sum: eca75c568616e9db02a5aad6b6c10c50251e02724c87db8c1433c7b1bc2fc617
-
-Package: hcxtools-full
-Version: 6.2.5-3
-Depends: libc, libpcap1, libopenssl1.1, libpthread, zlib, libcurl4, python3-light
+Version: 6.2.7
+Depends: libc, libpthread, zlib, libcurl4, libpcap1, libopenssl1.1
 License: MIT
 License: MIT
 Section: net
 Section: net
 Architecture: mipsel_24kc
 Architecture: mipsel_24kc
-Installed-Size: 104
-Description:  This package includes all the tools made by @ZerBea
- Tools: hcxtools, hcxdumptool, and wifi_laboratory (hcxlabtools)
-Filename: hcxtools-full_6.2.5-3_mipsel_24kc.ipk
-Size: 930
-SHA256sum: 8f843edd07ca035dd199644715d9d36a0d00322edbb396631a7a5ce9ce731d8d
+Installed-Size: 139292
+Description:  Portable solution for conversion of cap/pcap/pcapng (gz compressed) WiFi dump files to hashcat formats
+ and to John the Ripper formats. hcx: h = hash, c = convert and calculate candidates, x = different hashtypes
+Filename: hcxtools-custom_6.2.7_mipsel_24kc.ipk
+Size: 139631
+SHA256sum: d317e211d2ece236f7bfd73c143d83efeb3896a68446c5132da0218b947ec2c0
 
 
 Package: hostapd-mana
 Package: hostapd-mana
 Version: 2.6.5-28
 Version: 2.6.5-28

BIN
packages/mipsel_24kc/Packages.gz


BIN
packages/mipsel_24kc/hcxdumptool-custom_6.2.5-3_mipsel_24kc.ipk


BIN
packages/mipsel_24kc/hcxdumptool-custom_6.2.7_mipsel_24kc.ipk


BIN
packages/mipsel_24kc/hcxlabtools_6.2.5-3_mipsel_24kc.ipk


BIN
packages/mipsel_24kc/hcxlabtools_6.2.7_mipsel_24kc.ipk


BIN
packages/mipsel_24kc/hcxtools-custom_6.2.5-3_mipsel_24kc.ipk


BIN
packages/mipsel_24kc/hcxtools-custom_6.2.7_mipsel_24kc.ipk


BIN
packages/mipsel_24kc/hcxtools-full_6.2.5-3_mipsel_24kc.ipk