mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-17 03:25:46 +00:00
cf787a73eb
By sniffing a VNC challenge-response sequence off the network (typically when VNC is used without a decent cryptographic wrapper like SSH or SSL), you can recover the password fairly easily and quickly by letting VNCcrack pound on it. WWW: http://www.randombit.net/projects/vnccrack/ PR: ports/102279 Submitted by: Pankov Pavel <pankov_p at mail.ru>
35 lines
717 B
Makefile
35 lines
717 B
Makefile
# New ports collection makefile for: vnccrack
|
|
# Date created: 2006-08-19
|
|
# Whom: Pankov Pavel <pankov_p@mail.ru>
|
|
#
|
|
# $FreeBSD$
|
|
#
|
|
|
|
PORTNAME= vnccrack
|
|
PORTVERSION= 1.0.0
|
|
CATEGORIES= security
|
|
MASTER_SITES= http://files.randombit.net/vnccrack/
|
|
DISTNAME= VNCcrack-${PORTVERSION}
|
|
EXTRACT_SUFX= .tgz
|
|
|
|
MAINTAINER= pankov_p@mail.ru
|
|
COMMENT= A fast offline password cracker for VNC passwords
|
|
|
|
GNU_CONFIGURE= yes
|
|
USE_GCC= 3.2+
|
|
USE_OPENSSL= yes
|
|
|
|
SUB_FILES+= pkg-message
|
|
|
|
do-install:
|
|
@${INSTALL_PROGRAM} ${WRKSRC}/vnccrack ${TARGETDIR}/bin/vnccrack
|
|
|
|
post-install:
|
|
.if !defined(NOPORTDOCS)
|
|
@${MKDIR} ${DOCSDIR}
|
|
@${INSTALL_DATA} ${WRKSRC}/readme.txt ${DOCSDIR}/readme.txt
|
|
.endif
|
|
@${CAT} ${PKGMESSAGE}
|
|
|
|
.include <bsd.port.mk>
|