diff options
author | rhatto <rhatto@370017ae-e619-0410-ac65-c121f96126d4> | 2009-06-27 03:13:56 +0000 |
---|---|---|
committer | rhatto <rhatto@370017ae-e619-0410-ac65-c121f96126d4> | 2009-06-27 03:13:56 +0000 |
commit | 90805e72d82f9985065f5fe712ba35878ffb03be (patch) | |
tree | 4fa3d75417a506a46c27a6850cc5267f4d87a117 /net/analyzer | |
parent | 773bd0ff0138658e1844a8e2f89cb4363d563d5f (diff) | |
download | slackbuilds-90805e72d82f9985065f5fe712ba35878ffb03be.tar.gz slackbuilds-90805e72d82f9985065f5fe712ba35878ffb03be.tar.bz2 |
dsniff: adding dsniff
git-svn-id: svn+slack://slack.fluxo.info/var/svn/slackbuilds@2219 370017ae-e619-0410-ac65-c121f96126d4
Diffstat (limited to 'net/analyzer')
-rw-r--r-- | net/analyzer/dsniff/Manifest | 25 | ||||
-rw-r--r-- | net/analyzer/dsniff/dsniff.SlackBuild | 265 | ||||
-rw-r--r-- | net/analyzer/dsniff/slack-required | 5 |
3 files changed, 295 insertions, 0 deletions
diff --git a/net/analyzer/dsniff/Manifest b/net/analyzer/dsniff/Manifest new file mode 100644 index 00000000..f99c9544 --- /dev/null +++ b/net/analyzer/dsniff/Manifest @@ -0,0 +1,25 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA256 + +DIST dsniff-2.4b1.tar.gz 131666 MD5 2f761fa3475682a7512b0b43568ee7d6 RMD160 4d5dee193f0d252d22cfe2417f067460db9638b1 SHA1 25cfea26e9bbe016451180758a49d4d5bc9317d3 SHA256 a9803a7a02ddfe5fb9704ce86f0ffc48453c321e88db85810db411ba0841152a SHA512 62dafab293de6dc3e9b01561b3627d63ca334467c01c3550a6318d8bcbe99d5a301ec16967af34065a14e8bca1c4b6a41da766cbd51ebd8338615b950c4f642f +MKBUILD dsniff.mkbuild 5795 MD5 981794f7e31dc4c3c9ca31667e3db0ab RMD160 224afcf3215cce1923c48ea36d5de7771977ae1e SHA1 d49a2f8ab9a1ae9dcce8774fc04b75d0b54cf7dd SHA256 dd40081be09c221602387d4f23acaf902ba409423d9c5c2a2aef7c63dddc4a88 SHA512 bfb323f4367ccb20ec2ace2decbe8e68c141ef7a2464f3028906f817ae01ca4e847aca1797a94696ba4ec0dd1ebb3892252d5bf9f71df3c9a4c56d28fd559992 +PATCH dsniff_2.4b1+debian-18.diff.gz 44819 MD5 fbc9f62f9ab2f98f24f53ad497c1ce5d RMD160 bdfb4a6a270c84753dce39be3553df0d7e8c45e8 SHA1 d34fe16565845a2d46973671f867adad63f99667 SHA256 a65142b8d2206d3eae5db35d9972f8eac1110d45893d7f2182ca240ecd9b9d25 SHA512 9f219dfa7fd68399126cd2b373a7054168638606c03e8297af46a89c242f81e45f99857922e6782cab608b8cafab528bcfaeb37acd3cca85f5b4a8efd91e71d5 +SLACK-REQUIRED slack-required 89 MD5 1c69a3add7cae8bfd7db042acfec0007 RMD160 af99fa82fc64d70d96e77d3ede3162c32c8ac5f9 SHA1 f1ae712ed77f4358a97ed3d8f40aaafa5d390abf SHA256 d2cfaf172c9e26a4b3ea778011d79bb0316994902be114b1929d02a0998070c2 SHA512 b9aa3a88ed85ad7ff9255f858f8c612d44b58cd1f92bb96c1eddd34e5743364087b8d59e6d7e081686bb953de0bf6f9e8cbba5e118e17a05be9ec50f700390ab +SLACKBUILD dsniff.SlackBuild 8804 MD5 97344ee72c84a29556578a96921d772e RMD160 e597bdc290815dbe372f584da33872810deafb42 SHA1 5aec9324de58fea277c9ff27408bbce4607afcc3 SHA256 023504a23a95592229a11cd9597c0c63d0f403e7fce00c57b874a077bed785d1 SHA512 01d1a3c5fc7f422c83c0f675dd10c544e25f0c7ba491933f0715304621e1dbf3c3fa3ad1a5738520a0eab8cabc36cb2015783add1be825708bb5f64727557616 +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1.4.9 (GNU/Linux) + +iQIcBAEBCAAGBQJKRYw0AAoJEEHL93ESzgeiwv8P/jZkdPoVLMaA+L0Qx8C5kXFV +cZn+z7TxMBVX2O1gMr5bglClkdgUKl5fCgzaylrBjEPhAuwXee4tt5HcsnSpkbCi +wRwNMrOG24FwU0B6FsU2fQp8euhtNQaKct5PO5ZiiRx75b9BtocWEko6Eip8Tfz+ +fz5E+BU7j+hDjYwQtaWEiPe4cAv/cMkMFiUXfcrm9Cc+RyfugqP2DBxhcwD9cMIM +cotNShBh9LqD+7QMyey2BALbWfKz0SQ7MBOQAsalA/ITrIA3OZGf3vGSUbYU4OH+ +XLqMOqzr7vNMr0D7wdPVyH+KVaz/jF0mukWv+9Q/ztyjLQ3CiI+6ZPTFIG8z9o/I +vhsj0nM/hx+onnlvJS4IMqoHnH/SIPsOi+XhzNv1LN4Dbt0iv+pwGKK3bKEZ/cbC +zkQPVaGniAJZfjizwD4cPh/xBs+dQ7zZlejYKMPr/XmI/9/YviDDiQmgDsisRGoD +pMIintEgEVGozA85lsYtdL2vOdkys0DHMDX7VxVovBAxPtFAZCgr65ZFmi1KuTmj +TsFSDt07pdbWwNxSVWkZW3d0qqTaoHg+BY9YRgLv8NbWS7sFjPd+cQhmNowj5Eyw +h+xFXu5ODxk1/AkWzSLKuZh6B6Kxu2X/q+BqINHHYMOKu/vHYiX1riBfhHyvYuKN +ILwtga+joVYDWh7SWk55 +=vUXK +-----END PGP SIGNATURE----- diff --git a/net/analyzer/dsniff/dsniff.SlackBuild b/net/analyzer/dsniff/dsniff.SlackBuild new file mode 100644 index 00000000..9fb8f6d6 --- /dev/null +++ b/net/analyzer/dsniff/dsniff.SlackBuild @@ -0,0 +1,265 @@ +#!/bin/bash +# +# dsniff.SlackBuild is free software; you can redistribute +# it and/or modify it under the terms of the GNU General Public License as +# published by the Free Software Foundation; either version 2 of the License, +# or any later version. +# +# dsniff.SlackBuild is distributed in the hope that it will +# be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General +# Public License for more details. +# +# You should have received a copy of the GNU General Public License along +# with this program; if not, write to the Free Software Foundation, Inc., +# 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA +# +# slackbuild for dsniff, by Silvio Rhatto +# requires: libnids libnet +# tested: dsniff-2.4b1 +# model: generic.mkSlackBuild $Rev: 805 $ +# + +# Look for slackbuildrc +if [ -f ~/.slackbuildrc ]; then + source ~/.slackbuildrc +elif [ -f /etc/slackbuildrc ]; then + source /etc/slackbuildrc +fi + +# Set variables +CWD="$(pwd)" +SRC_NAME="dsniff" +PKG_NAME="dsniff" +ARCH=${ARCH:=i486} +SRC_VERSION=${VERSION:=2.4b1} +PKG_VERSION="$(echo "$SRC_VERSION" | tr '[[:blank:]-]' '_')" +BUILD=${BUILD:=1rha} +SRC_DIR=${SRC_DIR:=$CWD}/$PKG_NAME +TMP=${TMP:=/tmp} +PKG=${PKG:=$TMP/package-$PKG_NAME} +REPOS=${REPOS:=$TMP} +SLACKBUILD_PATH=${SLACKBUILD_PATH:="net/analyzer/dsniff"} +PREFIX=${PREFIX:=/usr} +PKG_WORK="$TMP/$SRC_NAME" +CONF_OPTIONS=${CONF_OPTIONS:=""} +NUMJOBS=${NUMJOBS:=""} + +# Set system libraries' path and optmization flags based on $ARCH +LIBDIR="$PREFIX/lib" + +if [ "$ARCH" = "i386" ]; then + SLKCFLAGS="-O2 -march=i386 -mtune=i686" +elif [ "$ARCH" = "i486" ]; then + SLKCFLAGS="-O2 -march=i486 -mtune=i686" +elif [ "$ARCH" = "i686" ]; then + SLKCFLAGS="-O2 -march=i686" +elif [ "$ARCH" = "s390" ]; then + SLKCFLAGS="-O2" +elif [ "$ARCH" = "x86_64" ]; then + SLKCFLAGS="-O2 -fPIC" + LIBDIR="$PREFIX/lib64" + LDFLAGS="-L/lib64 -L/usr/lib64" +fi + +# Set error codes (used by createpkg) +ERROR_WGET=31; ERROR_MAKE=32; ERROR_INSTALL=33 +ERROR_MD5=34; ERROR_CONF=35; ERROR_HELP=36 +ERROR_TAR=37; ERROR_MKPKG=38; ERROR_GPG=39 +ERROR_PATCH=40; ERROR_VCS=41; ERROR_MKDIR=42 +ERROR_MANIFEST=43; + +# Clean up any leftovers of previous builds +rm -rf "$PKG_WORK" 2> /dev/null +rm -rf "$PKG" 2> /dev/null + +# Create directories if necessary +mkdir -p "$SRC_DIR" || exit $ERROR_MKDIR +mkdir -p "$PKG" || exit $ERROR_MKDIR +mkdir -p "$REPOS" || exit $ERROR_MKDIR +mkdir -p "$PKG_WORK" || exit $ERROR_MKDIR + +# Dowload source if necessary +SRC="$SRC_NAME-$VERSION.tar.gz" +URL="http://www.monkey.org/~dugsong/dsniff/beta/$SRC" + +if [ ! -s "$SRC_DIR/$SRC" ] || ! gunzip -t "$SRC_DIR/$SRC" 2> /dev/null; then + wget "$URL" -O "$SRC_DIR/$SRC" || exit $ERROR_WGET +fi + +# Check Manifest file +if [ -e "$CWD/Manifest" ]; then + + # Manifest signature checking + if grep -q -- "-----BEGIN PGP SIGNED MESSAGE-----" $CWD/Manifest; then + echo "Checking Manifest signature..." + gpg --verify $CWD/Manifest + if [ "$?" != "0" ]; then + exit $ERROR_MANIFEST + fi + fi + + MANIFEST_LINES="`grep -E -v "^(MKBUILD|SLACKBUILD)" $CWD/Manifest | wc -l`" + + for ((MANIFEST_COUNT=1; MANIFEST_COUNT <= $MANIFEST_LINES; MANIFEST_COUNT++)); do + + MANIFEST_LINE="`grep -E -v "^(MKBUILD|SLACKBUILD)" $CWD/Manifest | head -n $MANIFEST_COUNT | tail -n 1`" + MANIFEST_FILE="`echo $MANIFEST_LINE | awk '{ print $2 }'`" + MANIFEST_FILE_TYPE="`echo $MANIFEST_LINE | awk '{ print $1 }'`" + + if [ -e "$SRC_DIR/$MANIFEST_FILE" ]; then + MANIFEST_FILE="$SRC_DIR/$MANIFEST_FILE" + else + MANIFEST_FILE="`find $CWD -name $MANIFEST_FILE`" + fi + + if [ ! -e "$MANIFEST_FILE" ] || [ -d "$MANIFEST_FILE" ]; then + continue + fi + + echo "Checking Manifest for $MANIFEST_FILE_TYPE $MANIFEST_FILE integrity..." + + SIZE_SRC="`wc -c $MANIFEST_FILE | awk '{ print $1 }'`" + SIZE_MANIFEST="`echo $MANIFEST_LINE | awk '{ print $3 }'`" + + # Check source code size + if [ "$SIZE_SRC" != "$SIZE_MANIFEST" ]; then + echo "SIZE Manifest: $SIZE_MANIFEST; SIZE $SRC: $SIZE_SRC" + exit $ERROR_MANIFEST + else + echo "Size match." + fi + + # Check source code integrity + for ALGO in md5 rmd160 sha1 sha256 sha512; do + if [ $ALGO = "rmd160" ]; then + ALGO_SRC="`openssl rmd160 $MANIFEST_FILE | awk '{ print $2 }'`" + else + ALGO_SRC="`"$ALGO"sum $MANIFEST_FILE | awk '{ print $1 }'`" + fi + ALGO="`echo $ALGO | tr '[:lower:]' '[:upper:]'`" + ALGO_MANIFEST=$(echo $MANIFEST_LINE | sed "s/.* $ALGO //" | awk '{ print $1 }') + if [ "$ALGO_SRC" != "$ALGO_MANIFEST" ]; then + echo "$ALGO Manifest: $ALGO_MANIFEST; $ALGO $SRC: $ALGO_SRC" + exit $ERROR_MANIFEST + else + echo "$ALGO match." + fi + done + + done + +else + exit $ERROR_MANIFEST +fi + +# Untar +cd "$PKG_WORK" +tar --no-same-owner --no-same-permissions -xvf "$SRC_DIR/$SRC" || exit $ERROR_TAR +PKG_SRC="$PWD/`ls -l | awk '/^d/ { print $NF }'`" +cd "$PKG_SRC" + +# Patch source +patches=" http://ftp.de.debian.org/debian/pool/main/d/dsniff/dsniff_2.4b1+debian-18.diff.gz + $PKG_NAME.diff $PKG_NAME-$PKG_VERSION.diff + $PKG_NAME-$PKG_VERSION-$ARCH.diff $PKG_NAME-$ARCH.diff" +for patch in $patches; do + patch="`basename $patch`" + if [ -f "$CWD/$patch" ]; then + patch -Np1 < "$CWD/$patch" || exit $ERROR_PATCH + elif [ -f "$CWD/patches/$patch" ]; then + patch -Np1 < "$CWD/patches/$patch" || exit $ERROR_PATCH + elif [ -f "$CWD/$patch.gz" ]; then + gzip -dc "$CWD/$patch.gz" | patch -Np1 || exit $ERROR_PATCH + elif [ -f "$CWD/patches/$patch.gz" ]; then + gzip -dc "$CWD/patches/$patch.gz" | patch -Np1 || exit $ERROR_PATCH + elif [ -f "$SRC_DIR/$patch" ]; then + if [ "`basename $patch .gz`" != "$patch" ]; then + gzip -dc $SRC_DIR/$patch | patch -Np1 || exit $ERROR_PATCH + elif [ "`basename $patch .bz2`" != "$patch" ]; then + bzip2 -dc $SRC_DIR/$patch | patch -Np1 || exit $ERROR_PATCH + else + patch -Np1 < "$SRC_DIR/$patch" || exit $ERROR_PATCH + fi + fi +done + +# Configure +cat debian/patches/*.dpatch | patch -p1 +sed -i 's/@NIDSLIB@/@NIDSLIB@ -lgthread-2.0/' Makefile.in || exit $ERROR_CONF +CFLAGS="$SLKCFLAGS" \ + CXXFLAGS="$SLKCFLAGS" \ + ./configure \ + --prefix="$PREFIX" --libdir="$LIBDIR" $CONF_OPTIONS || exit $ERROR_CONF + +# Compile +make $NUMJOBS || exit $ERROR_MAKE + +# Install +make install install_prefix="$PKG" || exit $ERROR_INSTALL + +# Strip binaries +( cd "$PKG" + find . | xargs file | grep "executable" | grep ELF | cut -f 1 -d : | \ + xargs strip --strip-unneeded 2> /dev/null + find . | xargs file | grep "shared object" | grep ELF | cut -f 1 -d : | \ + xargs strip --strip-unneeded 2> /dev/null +) + +# Compress and link manpages +if [ -d "$PKG/$PREFIX/man" ]; then + ( cd "$PKG/$PREFIX/man" + for manpagedir in $(find . -type d -name "man*") ; do + ( cd $manpagedir + for eachpage in $( find . -type l -maxdepth 1) ; do + ln -s $( readlink $eachpage ).gz $eachpage.gz + rm $eachpage + done + gzip -9 *.? + ) + done + ) +fi + +# Install documentation +DOCS="CHANGES LICENSE README TODO" +mkdir -p "$PKG/usr/doc/$PKG_NAME-$PKG_VERSION" || exit $ERROR_MKDIR +for doc in $DOCS; do + if [ -f "$doc" ]; then + cp -a $doc "$PKG/usr/doc/$PKG_NAME-$PKG_VERSION" + fi +done + +# Add package description (slack-desc) +mkdir -p "$PKG/install" || exit $ERROR_MKDIR +cat << EODESC > "$PKG/install/slack-desc" +# HOW TO EDIT THIS FILE: +# The "handy ruler" below makes it easier to edit a package description. Line +# up the first '|' above the ':' following the base package name, and the '|' +# on the right side marks the last column you can put a character in. You must +# make exactly 11 lines for the formatting to be correct. It's also +# customary to leave one space after the ':'. + + |-----handy-ruler-------------------------------------------------------| +dsniff: dsniff +dsniff: +dsniff: dsniff is a collection of tools for network auditing and +dsniff: penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, +dsniff: urlsnarf, and webspy passively monitor a network for interesting +dsniff: data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and +dsniff: macof facilitate the interception of network traffic normally +dsniff: unavailable to an attacker (e.g, due to layer-2 switching). +dsniff: sshmitm and webmitm implement active monkey-in-the-middle +dsniff: attacks against redirected SSH and HTTPS sessions by +dsniff: exploiting weak bindings in ad-hoc PKI. +EODESC + +# Build the package +cd "$PKG" +mkdir -p $REPOS/$SLACKBUILD_PATH +makepkg -l y -c n "$REPOS/$SLACKBUILD_PATH/$PKG_NAME-$PKG_VERSION-$ARCH-$BUILD.tgz" || exit $ERROR_MKPKG + +# Delete source and build directories if requested +if [ "$CLEANUP" == "yes" ] || [ "$1" = "--cleanup" ]; then + rm -rf "$PKG_WORK" "$PKG" +fi diff --git a/net/analyzer/dsniff/slack-required b/net/analyzer/dsniff/slack-required new file mode 100644 index 00000000..738811d4 --- /dev/null +++ b/net/analyzer/dsniff/slack-required @@ -0,0 +1,5 @@ +# Dependency list to dsniff +# +# dependency [condition] [version]] +libnids +libnet |