instruction
stringlengths 108
315
| input
stringclasses 1
value | output
stringlengths 99
9.93M
|
|---|---|---|
Explain the purpose of the module 'aircrack-ng/.clang-format'. Describe how it is used in security workflows. Language: unknown.
|
---
AlignAfterOpenBracket: Align
AlignConsecutiveAssignments: false
AlignConsecutiveDeclarations: false
AlignOperands: true
AlignTrailingComments: false
AllowShortCaseLabelsOnASingleLine: false
AllowShortFunctionsOnASingleLine: All
AllowShortIfStatementsOnASingleLine: true
AllowShortLoopsOnASingleLine: true
AlwaysBreakBeforeMultilineStrings: false
BinPackArguments: false
BinPackParameters: false
BreakBeforeBinaryOperators: All
BreakBeforeBraces: Allman
BreakBeforeTernaryOperators: true
ColumnLimit: 80
ContinuationIndentWidth: 4
IndentCaseLabels: true
IndentWidth: 4
MaxEmptyLinesToKeep: 1
NamespaceIndentation: None
PointerAlignment: Middle
ReflowComments: false
SortIncludes: false
SpaceAfterCStyleCast: true
SpaceBeforeAssignmentOperators: true
SpaceBeforeParens: ControlStatements
SpaceInEmptyParentheses: false
SpacesInAngles: false
SpacesInParentheses: false
SpacesInSquareBrackets: false
Standard: Cpp11
TabWidth: 4
UseTab: Always
|
|
Explain the purpose of the module 'aircrack-ng/.codespellrc'. Describe how it is used in security workflows. Language: unknown.
|
[codespell]
skip = *.patch,./LICENSE.OpenSSL,./test/password.lst,./test/password-2.lst,./test/password-3.lst,
ignore-words-list = aci,ba,curent,datas,inout,keep-alives,nnumber,overthere,parm,parms,ue,varian,wan
|
|
Explain the purpose of the module 'aircrack-ng/.coverityignore'. Describe how it is used in security workflows. Language: unknown.
|
apparmor/
contrib/
manpages/
patches/
scripts/
.github/
.vscode/
.clang-format
.editorconfig
.gitignore
.pre-commit-config.yaml
AC_VERSION.in
AUTHORS
centos_autotools.sh
ChangeLog
docker_package_install.sh
Dockerfile
Dockerfile.release
INSTALLING
LICENSE.OpenSSL
README
SECURITY.md
|
|
Explain the purpose of the module 'aircrack-ng/.editorconfig'. Describe how it is used in security workflows. Language: unknown.
|
[*]
charset=utf-8
end_of_line=lf
insert_final_newline=false
indent_style=tab
indent_size=4
[{*.c,*.cp,*.cc,*.hpp,*.cpp,*.tcc,*.hp,*.cxx,*.icc,*.mm,*.hxx,*.ii,*.hh,*.m,*.i,*.h,*.h++,*.c++,*.pch,*.inl}]
indent_style=tab
indent_size=4
insert_final_newline=false
[{CMakeLists.txt,*.cmake}]
indent_style=space
indent_size=2
[{Makefile.*,Makefile,GNUmakefile,makefile,*.mk}]
indent_style=tab
tab_width=2
[{*.yml,*.yaml}]
indent_style=space
indent_size=2
[appveyor.yml]
end_of_line=crlf
|
|
Explain the purpose of the module 'aircrack-ng/.gitignore'. Describe how it is used in security workflows. Language: unknown.
|
/*-ng
/besside-ng-crawler
/ivstools
/kstats
/wpaclean
src/osdep/.os.Linux
src/osdep/libosdep.a
src/tags
tags
*.a
*.so
*.dll
*.o
*.exe
*.log
*.trs
*.zip
*.tar.*
common.cfg
Makefile.in
aclocal.m4
autom4te.cache/
compile
/config.h
/config.h.in
config.guess
config.log
config.status
config.sub
configure
install-sh
libtool
ltmain.sh
missing
reautogen.sh
src/Makefile.in
*.lo
.deps
.libs
.dirstamp
/depcomp
/aminclude_static.am
/stamp-h1
*.la
*.gcda
*.gcno
*.orig
/test-driver
/**/*-coverage.info
/**/*-coverage
/**/*.log
/**/*.trs
/scripts/airdrop-ng/build
/scripts/airgraph-ng/build
/test-calc-4pmk
/test-calc-mic
/test-calc-pmk
/test-calc-ptk
/test-cipher-arcfour
/test-decrypt-ccmp
/test-digest-md5
/test-digest-sha1
/test-encrypt-ccmp
/test-encrypt-wep
/test-hex_string_to_array
/test-kdf-pbkdf2-hmac-sha1
/test-mac-hmac-md5
/test-mac-hmac-sha1
/test-mac-hmac-sha256
/build/m4/stubs/*
!/build/m4/stubs/.gitkeep
/test/test-env.sh
/.idea
/.clang_complete
CMakeLists.txt
/cmake-build-*
*.gcda
*.gcno
Makefile
!/contrib/commview/Makefile
!/contrib/airpcap/Makefile
!/contrib/peek/Makefile
!/scripts/airgraph-ng/lib/Makefile
/scripts/airmon-ng
/benchmark.csv
/.cccc
/cccc.opt
/.scannerwork
/.bash_history
/.cproject
/.lesshst
/.project
/.rpmdb
/.settings
benchmark*.csv
/bw-output
compile_commands.json
coverage*.info
/test/cryptounittest/default.profraw
/test-calc-one-pmk
/test-string-has-suffix
/test-wpapsk
/test-wpapsk-cmac
/test-circular-buffer
/test-circular-queue
/GPATH
/GRTAGS
/GSYMS
/GTAGS
/VERSION
/AC_VERSION
/aminclude_static.am
/config.h
/config.h.in
/include/aircrack-ng/version.h
/manpages/*.1
/manpages/*.8
/.ccls-cache
/.cache
/.gdb_history
/cscope*
/strace_out
/.clangd
/r*hs
/r*hs-bad
/r*tr
/r*tr-bad
*~
*.pidb
/.vscode/settings.json
/infer-out/
|
|
Explain the purpose of the module 'aircrack-ng/.pre-commit-config.yaml'. Describe how it is used in security workflows. Language: YAML.
|
---
# See https://pre-commit.com for more information
# See https://pre-commit.com/hooks.html for more hooks
exclude: >
(?x)^(
.github/|AUTHORS|ChangeLog|INSTALLING|LICENSE|README|
appveyor.yml|build/airpcap.dll.def|contrib/|lib/csharp|
lib/radiotap|include/aircrack-ng/third-party|patches/|
test/|scripts/|manpages/|apparmor/
)
fail_fast: false
repos:
- repo: https://github.com/pre-commit/pre-commit-hooks
rev: v4.0.1
hooks:
- id: trailing-whitespace
exclude_types: [asm]
- id: check-added-large-files
- id: mixed-line-ending
exclude_types: [asm]
- id: check-byte-order-marker
- id: check-executables-have-shebangs
- id: check-merge-conflict
- repo: https://github.com/pocc/pre-commit-hooks
rev: v1.3.5
hooks:
- id: clang-format
args: ["--style=file", "-i"]
- repo: https://github.com/shellcheck-py/shellcheck-py
rev: v0.7.2.1
hooks:
- id: shellcheck
files: 'test/|scripts/|build/'
- repo: https://github.com/hadolint/hadolint
rev: v2.12.0
hooks:
- id: hadolint
files: 'Dockerfile|Dockerfile.release'
|
|
Explain the purpose of the module 'aircrack-ng/AUTHORS'. Describe how it is used in security workflows. Language: unknown.
|
Original Author
===============
Thomas d'Otreppe <tdotreppe@aircrack-ng.org>
Contributors
============
* Zero Chaos
- Airmon-ng maintainer
- Occasional driver patch fixer
- Driver tester
* Joseph Benden <joe@aircrack-ng.org>
- Instituted the project's coding style & formatting guidelines
- Performed conversion from Subversion and Trac to GitHub
- Continuous Integration: Buildbot system as well as AppVeyor setup and tuning TravisCI
- Converted project from Makefiles to an Autotools-based build
- Forged the WPA cracking engine; capable of linearly scaling up to at least 96 cores
- Dynamically utilize the best SIMD instructions, at run-time, instead of build-time
- Improved compilation on non-x86 platforms
- Fixed many issues relating to SIMD on non-x86 architectures
* Levert
- Initial Subversion, trac and buildbot set-up
* Andrea Bittau
- osdep: OS-dependant capture/injection layer conditionally (OS) compiled
* hirte (Martin Beck) <martin.beck2@gmx.de>
- Aircrack-ng: implementation of PTW, KoreK attack speedup
- Aireplay-ng: Fragmentation attack, Shared Key Authentication attack,
injection test, hirte attack, Caffe Latte, Client Fragmentation,
using two wireless interfaces in aireplay-ng (one for capture, one for injection)
- Airodump-ng: Screen formatting and layout improvements
- ieee80211 and mac80211 driver patches and driver-related changes/fixes in the tools
- osdep improvements (mac80211 among other things) and fixes
- New tools: airtun-ng, tkiptun-ng, airserv-ng, airdriver-ng, airbase-ng
- IVS file format
- airmon-ng improvements
- Partial handshake cracking and detection
* Carlos Lopez <clopez@igalia.com>
- Added support for gcrypt instead of openssl
- Crypto unit tests and tests for other tools
- Manpage reorganization and improvements
- Makefile fixes and improvements
- Travis CI set-up
- Airodump-ng: --manufacturer, --wps options
* DarkAudax
- Wiki: Documentation and tutorials
- Added unit tests
* ASPj (Pedro Larbig)
- Driver-related fixes
- New tools: Airtun-ng
- ieee80211 driver patches (ipw3945, rt73, rt2570, prism2)
- MDK3
- WDS support in different tools
- besside-ng-crawler
* Leandro Meiners <lmeiners@coresecurity.com/gmail.com>
and Diego Sor <dsor@coresecurity.com/diegos@gmail.com>
- WPA Migration mode attack and documentation
* nathanh2011
- Revamped GPS logging functionality and added logcsv format
* XayOn
- Airoscript-ng
- Airgraph-ng and airdrop-ng improvements
* Daouid
- Airoscript
* Chris Lundquist
- Aircrack-ng: Crack HCCAPx files
- Aircrack-ng: Improve loading speed of large capture files
- Aircrack-ng: Improve processing speed of large capture files
* kimocoder (Christian B.) <kimocoder@aircrack-ng.org>
- rtl8812au driver
* dzk|kuro <dzk.kuro@gmail.com>
- Initial capture/injection on BSD
* Erik Tews <e_tews@cdc.informatik.tu-darmstadt.de>
- Author of PTW attack
* Loris Degioanni
- Airpcap support
* NetRoller3D
- mac80211 driver patches and related fixes/improvements in osdep
- Airmon-ng fixes
- Radiotap support (and PPI detection) in various tools
- Airdriver-ng improvements
* Moshe Kaplan
- Coverity Scan set-up
- Memory leak and other fixes
- AppArmor profiles
* TheX1le (Ben Smith)
- airgraph-ng
- versuck-ng
- airdrop-ng
* nx5 (Alvaro Salmador) <naplam33@msn.com>
- Aircrack-ng: WPA SSE2 implementation
* Len White
- Aircrack-ng: WPA AVX/AVX2 code porting from JTR
* Tim de Waal
- Airventriloquist-ng
Thanks to
=========
Alon Bar-Lev <alon.barlev@gmail.com>
Almantsas
Jano
yh0- <yysjryysjr@gmail.com>
Darko Sancanin <darko.sancanin@gmail.com>
Fabrice Fontaine
Julian Tyler
LatinSud aka SuD
layoyo
Marohiver
Michael Buesch <mb@bu3sch.de>
myst404
Ryan Schmidt
neheb (Rosen Penev)
San Foxman
Samuel Henrique
tjt263
ZhaoChunsheng
Kyle Fuller <inbox@kylefuller.co.uk>
SemiSkimmedSteve
mnt
XBM5
Raúl Calvo Laorden
Lars Engels
darkfires
Marks
Mathy Vanhoef
Wojciech Waga
Gustavo Zacarias
steev
rmh
Arnaud Fontaine
beini
yadox
Ramiro Polla
matrix.use.linux
m4tr1x
dan
Christoph J. Thompson
stsp
Edgan
Wiz
Wouter van Kesteren
buzzsaw
slyfox
Sergei Trofimovich
mrpisto
Paul Fertser
impulse32
jeroenimo
iceblox
Ludovic Drolez
Christian Mock
Weedy
... and to anybody else who contributed, who, sometimes wishes to remain anonymous.
|
|
Explain the purpose of the module 'aircrack-ng/autogen.sh'. Describe how it is used in security workflows. Language: Shell Script.
|
#!/bin/sh
#
# Aircrack-ng
#
# Copyright (C) 2017 Joseph Benden <joe@benden.us>
#
# Autotool support was written by: Joseph Benden <joe@benden.us>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
#
# In addition, as a special exception, the copyright holders give
# permission to link the code of portions of this program with the
# OpenSSL library under certain conditions as described in each
# individual source file, and distribute linked combinations
# including the two.
#
# You must obey the GNU General Public License in all respects
# for all of the code used other than OpenSSL.
#
# If you modify file(s) with this exception, you may extend this
# exception to your dnl version of the file(s), but you are not obligated
# to do so.
#
# If you dnl do not wish to do so, delete this exception statement from your
# version.
#
# If you delete this exception statement from all source files in the
# program, then also delete it here.
set -euf
test -n "${srcdir:-}" || srcdir="$(dirname "$0")"
test -n "${srcdir:-}" || srcdir=.
cd "$srcdir"
missing_tool()
{
_prog="$1"
_env="$2"
echo "Could not auto-detect '${_prog}'; please install or specify the '${_env}' environment variable."
exit 1
}
if [ -z "${LIBTOOLIZE:-}" ]; then
if which libtoolize >/dev/null 2>/dev/null; then
LIBTOOLIZE="$(which libtoolize 2>/dev/null)"
elif which glibtoolize >/dev/null 2>/dev/null; then
LIBTOOLIZE="$(which glibtoolize 2>/dev/null)"
else
missing_tool libtoolize LIBTOOLIZE
fi
fi
if [ -z "${ACLOCAL:-}" ]; then
if which aclocal >/dev/null 2>/dev/null; then
ACLOCAL="$(which aclocal 2>/dev/null)"
else
missing_tool aclocal ACLOCAL
fi
fi
if [ -z "${AUTOCONF:-}" ]; then
if which autoconf >/dev/null 2>/dev/null; then
AUTOCONF="$(which autoconf 2>/dev/null)"
else
missing_tool autoconf AUTOCONF
fi
fi
if [ -z "${AUTOHEADER:-}" ]; then
if which autoheader >/dev/null 2>/dev/null; then
AUTOHEADER="$(which autoheader 2>/dev/null)"
else
missing_tool autoheader AUTOHEADER
fi
fi
if [ -z "${AUTOMAKE:-}" ]; then
if which automake >/dev/null 2>/dev/null; then
AUTOMAKE="$(which automake 2>/dev/null)"
else
missing_tool automake AUTOMAKE
fi
fi
"$LIBTOOLIZE" --force --copy --automake
"$ACLOCAL" -I build/m4/stubs -I build/m4 ${ACLOCAL_FLAGS:-}
"$AUTOCONF"
"$AUTOHEADER"
"$AUTOMAKE" \
--gnu --add-missing --force --copy \
-Wno-portability -Wno-portability
{ cat <<EOF
#!/usr/bin/env bash
./autogen.sh "$@" "\$@"
EOF
} > reautogen.sh
chmod +x reautogen.sh
if [ -n "${NOCONFIGURE:-}" ]; then
echo "Done. ./configure skipped."
exit $?
fi
exec ./configure "$@"
|
|
Explain the purpose of the module 'aircrack-ng/centos_autotools.sh'. Describe how it is used in security workflows. Language: Shell Script.
|
#!/bin/sh
# Install newer version of autotools, automake, libtool, and pkgconfig on CentOS 7
if [ ! -f /etc/os-release ]; then
echo 'os-release not present, aborting'
exit 1
fi
. /etc/os-release
# Untested on Red Hat
if [ "x${ID}" != 'xcentos' ] && [ "x${ID}" != 'xredhat' ]; then
echo 'OS is not CentOS or Red Hat, aborting'
exit 1
fi
if [ "x${VERSION_ID}" != 'x7' ]; then
echo "Invalid CentOS/Red Hat version. Expected 7, got ${VERSION_ID}, aborting"
exit 1
fi
yum install epel-release
# Install packages if not already present
# Yeah, automake is required to build a newer version of automake
PACKAGES="tar glib2-devel gcc gcc-c++ make m4 perl-Data-Dumper help2man automake"
NB_INSTALLED_PKG=$(yum list install ${PACKAGES} | sed -n '/Installed Packages/,$p' | wc -l)
# Count includes the "Installed Packages" line, so decreasing count by 1
NB_INSTALLED_PKG=$((NB_INSTALLED_PKG-1))
NB_PKG=$(echo ${PACKAGES} | wc -w)
[ ${NB_PKG} -ne ${NB_INSTALLED_PKG} ] && yum install ${PACKAGES}
autoconf_version=2.69
automake_version=1.16.1
libtool_version=2.4.6
pkgconf_version=0.29
TMP_DIR=$(mktemp -d)
cd ${TMP_DIR}
echo "Installing autoconf ${autoconf_version}"
curl -L http://ftp.gnu.org/gnu/autoconf/autoconf-${autoconf_version}.tar.xz > autoconf-${autoconf_version}.tar.xz \
&& tar xJf autoconf-${autoconf_version}.tar.xz \
&& cd autoconf-${autoconf_version} \
&& ./configure --prefix=/usr/local \
&& make \
&& make install \
&& cd ..
# Requires autoconf 2.65+
echo "Installing automake ${automake_version}"
curl -L http://ftp.gnu.org/gnu/automake/automake-${automake_version}.tar.xz > automake-${automake_version}.tar.xz \
&& tar xJf automake-${automake_version}.tar.xz \
&& cd automake-${automake_version} \
&& ./configure --prefix=/usr/local \
&& make \
&& make install \
&& cd ..
echo "Installing libtool ${libtool_version}"
curl -L http://ftp.gnu.org/gnu/libtool/libtool-${libtool_version}.tar.xz > libtool-${libtool_version}.tar.xz \
&& tar xJf libtool-${libtool_version}.tar.xz \
&& cd libtool-${libtool_version} \
&& ./configure --prefix=/usr/local \
&& make \
&& make install \
&& cd ..
echo "Installing pkg-config ${pkgconf_version}"
curl -L https://pkg-config.freedesktop.org/releases/pkg-config-${pkgconf_version}.tar.gz > pkg-config-${pkgconf_version}.tar.gz \
&& tar xzf pkg-config-${pkgconf_version}.tar.gz \
&& cd pkg-config-${pkgconf_version} \
&& ./configure --prefix=/usr/local --libdir=/usr/lib64 \
&& make \
&& make install \
&& cd ..
echo 'Done'
|
|
Explain the purpose of the module 'aircrack-ng/configure.ac'. Describe how it is used in security workflows. Language: unknown.
|
# Aircrack-ng
#
# Copyright (C) 2017-2022 Joseph Benden <joe@benden.us>
#
# Autotool support was written by: Joseph Benden <joe@benden.us>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
#
# In addition, as a special exception, the copyright holders give
# permission to link the code of portions of this program with the
# OpenSSL library under certain conditions as described in each
# individual source file, and distribute linked combinations
# including the two.
#
# You must obey the GNU General Public License in all respects
# for all of the code used other than OpenSSL.
#
# If you modify file(s) with this exception, you may extend this
# exception to your # version of the file(s), but you are not obligated
# to do so.
#
# If you # do not wish to do so, delete this exception statement from your
# version.
#
# If you delete this exception statement from all source files in the
# program, then also delete it here.
m4_pattern_allow([AC_VERSION])
m4_define([version_date], "May 2022")
m4_define([version_major], 1)
m4_define([version_minor], 7)
m4_define([version_micro], 0)
m4_define([version_beta], 0)
m4_define([version_rc], 0)
m4_define([version_scm],[m4_translit(m4_esyscmd([$(pwd)/evalrev . scm || echo]),m4_newline)])
m4_define([version_triplet],version_major.version_minor.version_micro)
m4_append([version_triplet],version_scm)
AC_PREREQ([2.59])
AC_INIT([aircrack-ng],[version_triplet],[https://github.com/aircrack-ng/aircrack-ng/discussions])
#
# Cross-Compilation
#
AC_CANONICAL_BUILD
AC_CANONICAL_HOST
AC_CANONICAL_TARGET
#
# Initialize Automake
#
AC_CONFIG_AUX_DIR([.])
AC_CONFIG_MACRO_DIR([build/m4/stubs])
AC_CONFIG_HEADERS([config.h])
AM_INIT_AUTOMAKE([1.14 dist-bzip2 dist-zip foreign subdir-objects])
AM_MAINTAINER_MODE([disable])
AC_SUBST([ACLOCAL_AMFLAGS], ["-I build/m4/stubs -I build/m4 \${ACLOCAL_FLAGS}"])
m4_ifdef([AM_SILENT_RULES], [AM_SILENT_RULES([yes])])
#
# Ensure MAKE is GNU compatible
#
if ! ${MAKE-make} --version /cannot/make/this >/dev/null 2>&1; then
AC_MSG_ERROR([you don't seem to have GNU make; it is required])
fi
#
# Find tooling
#
AIRCRACK_NG_PROG_CC
AIRCRACK_NG_PROG_CXX
AX_CXX_COMPILE_STDCXX([17], [ext], [optional])
if test "$HAVE_CXX17" = "0"; then
AX_CXX_COMPILE_STDCXX([14], [ext], [optional])
if test "$HAVE_CXX14" = "0"; then
AX_CXX_COMPILE_STDCXX([11], [ext], [mandatory])
fi
fi
AC_PROG_INSTALL
AM_PROG_AS
PKG_PROG_PKG_CONFIG
AM_PROG_CC_C_O
AC_C_CONST
AC_PROG_EGREP
AC_CHECK_HEADERS([locale.h stdio.h stdarg.h fcntl.h malloc.h stdlib.h string.h strings.h unistd.h sys/stat.h getopt.h sys/time.h sys/types.h dirent.h])
#
# Set versioning detail
#
AC_SUBST([_MAJ], [version_major])
AC_SUBST([_MIN], [version_minor])
AC_SUBST([_SUB_MIN], [version_micro])
AC_SUBST([_BETA], [version_beta])
AC_SUBST([_RC], [version_rc])
AC_SUBST([_SCM], [version_scm])
AC_SUBST([LT_VER], [version_major.version_minor.version_micro])
AC_SUBST([MAN_RELEASE_DATE], [version_date])
AC_SUBST([MAN_RELEASE_VERSION], ["Version version_triplet"])
AC_DEFINE([_REVISION], ["version_triplet"], [The version information of the project])
AC_DEFINE([LT_CYGWIN_VER], ["-version_major-version_minor-version_micro.dll"], [The Cygwin DLL version string suffix])
#
# Initialize libtool
#
LT_INIT([win32-dll disable-static shared])
#
# Operating Systems
#
AIRCRACK_NG_MAC
AIRCRACK_NG_WINDOWS
AIRCRACK_NG_OS_DETECT
#
# Required
#
AIRCRACK_NG_CRYPTO
AIRCRACK_NG_ETHTOOL
AIRCRACK_NG_LIBNL
#
# Optional
#
AIRCRACK_NG_AIRPCAP
AIRCRACK_NG_EXPECT
AIRCRACK_NG_EXPERIMENTAL
AIRCRACK_NG_EXT_SCRIPTS
AIRCRACK_NG_HWLOC
AIRCRACK_NG_PCAP
AIRCRACK_NG_PCRE
AIRCRACK_NG_RFKILL
AIRCRACK_NG_SQLITE
AIRCRACK_NG_ZLIB
PKG_CHECK_MODULES([CMOCKA], [cmocka], [
CMOCKA_FOUND=yes
AC_SUBST([CMOCKA_CFLAGS])
AC_SUBST([CMOCKA_LIBS])
], [CMOCKA_FOUND=no])
#
# Extras, but needed
#
AIRCRACK_NG_LARGEFILE
AIRCRACK_NG_PTHREAD
AX_LIB_SOCKET_NSL
AC_CHECK_LIB([dl], [dlopen], [ LIBS="$LIBS -ldl" ], [:])
AC_CHECK_LIB([m], [sin], [ LIBS="$LIBS -lm" ], [:])
AIRCRACK_NG_COMPAT
saved_cflags="$CFLAGS"
CFLAGS=""
AC_CHECK_FUNCS([posix_memalign aligned_alloc memalign __mingw_aligned_malloc _aligned_malloc], break)
CFLAGS="$saved_cflags"
#
# Code Coverage Support
#
AIRCRACK_NG_CODE_COVERAGE
#
# Compiler set-up
#
AIRCRACK_NG_COMPILER_C
AIRCRACK_NG_COMPILER_CXX
#
# Processor feature selection/detection
#
AIRCRACK_NG_SIMD_C
AIRCRACK_NG_SIMD_CXX
#
# Optional analyzers
#
AIRCRACK_NG_ASAN
AIRCRACK_NG_DUMA
AIRCRACK_NG_JEMALLOC
AIRCRACK_NG_TCMALLOC
AIRCRACK_NG_TSAN
#
# Automake
#
AM_CONDITIONAL([HAVE_AIRPCAP_OR_PCAP], [test "$AIRPCAP" = yes -o "$PCAP_FOUND" = yes])
AM_CONDITIONAL([MULTIBIN], [test "$with_multibin" = yes])
AM_CONDITIONAL([ENABLE_INSTALLED_TESTS], [test "nope" = yes]) # for glib tests
AM_CONDITIONAL([CMOCKA], [test "$CMOCKA_FOUND" = yes])
AM_CONDITIONAL([STATIC_BUILD], [test "$enable_static" = yes])
AM_CONDITIONAL([EXPECT], [test "$EXPECT_FOUND" = yes])
#
# Save flags for build summary
#
summary_cflags="$CFLAGS"
summary_cxxflags="$CXXFLAGS"
summary_cppflags="$CPPFLAGS"
summary_libs="$LIBS"
#
# Set final flags for build
#
CFLAGS="$opt_cflags $CFLAGS"
CPPFLAGS="$opt_cppflags $CPPFLAGS"
CXXFLAGS="$opt_cxxflags $CXXFLAGS"
LDFLAGS="$opt_ldflags $LDFLAGS"
LIBS="$opt_libs $LIBS"
#
# Generate all build files
#
AC_CONFIG_FILES([
Makefile
AC_VERSION
include/aircrack-ng/version.h
manpages/airbase-ng.8
manpages/aircrack-ng.1
manpages/airdecap-ng.1
manpages/airdecloak-ng.1
manpages/aireplay-ng.8
manpages/airmon-ng.8
manpages/airodump-ng.8
manpages/airodump-ng-oui-update.8
manpages/airolib-ng.1
manpages/airserv-ng.8
manpages/airtun-ng.8
manpages/airventriloquist-ng.8
manpages/besside-ng.8
manpages/besside-ng-crawler.1
manpages/buddy-ng.1
manpages/easside-ng.8
manpages/ivstools.1
manpages/kstats.1
manpages/Makefile
manpages/makeivs-ng.1
manpages/packetforge-ng.1
manpages/tkiptun-ng.8
manpages/wesside-ng.8
manpages/wpaclean.1
scripts/Makefile
scripts/airdrop-ng/Makefile
scripts/airdrop-ng/doc/Makefile
scripts/airgraph-ng/Makefile
scripts/airgraph-ng/man/Makefile
scripts/versuck-ng/Makefile
test/test-env.sh
])
AC_OUTPUT
#
# Output a summary of the build to be performed
#
cat <<EOF
${PACKAGE} ${VERSION}
Build Environment:
Build Machine: ${build}
Host Machine: ${host}
Target Machine: ${target}
Install Prefix: ${prefix}
Compiler Environment:
C Compiler: ${CC}
C++ Compiler: ${CXX}
Python: ${PYTHON}
CFLAGS: ${summary_cflags}
CXXFLAGS: ${summary_cxxflags}
CPPFLAGS: ${summary_cppflags}
LDFLAGS: ${LDFLAGS}
LIBS: ${summary_libs}
Optimized CFLAGS: ${opt_cflags}
Optimized CXXFLAGS: ${opt_cxxflags}
Optimized CPPFLAGS: ${opt_cppflags}
Optimized LDFLAGS: ${opt_ldflags}
Optimized LIBS: ${opt_libs}
Target Environment:
OS: ${OS}
ASAN: ${asan}
CPU L1 cache-line size: ${CACHELINE_SIZE}
LTO ${with_lto:-no}
Crypto Libraries:
Crypto Engine: ${CRYPTO_TYPE}
Gcrypt: ${GCRYPT_LIBS}
OpenSSL: ${OPENSSL_LIBS}
Required Libraries:
Ethtool: ${ETHTOOL_FOUND}
Libnl: ${NLLIBNAME_FOUND}
Optional Libraries:
Airpcap: ${AIRPCAP}
Cmocka: ${CMOCKA_FOUND}
DUMA: ${DUMA}
Hwloc: ${HAVE_HWLOC}
Jemalloc: ${JEMALLOC}
Pcap: ${PCAP_FOUND}
Pcre: ${HAVE_PCRE}
Pcre2: ${HAVE_PCRE2} ${PCRE2_NOTE}
Sqlite: ${HAVE_SQLITE3}
Tcmalloc: ${TCMALLOC}
Zlib: ${HAVE_ZLIB}
Features:
CMAC Support: ${HAVE_CMAC}
Experimental Extra Scripts: ${EXT_SCRIPTS}
Experimental Features: ${EXPERIMENTAL}
EOF
|
|
Explain the purpose of the module 'aircrack-ng/Dockerfile'. Describe how it is used in security workflows. Language: unknown.
|
ARG IMAGE_BASE=debian:unstable-slim
# hadolint ignore=DL3006
FROM ${IMAGE_BASE} AS builder
# Install dependencies for building
COPY docker_package_install.sh /
RUN sh /docker_package_install.sh builder
# Build Aircrack-ng
# hadolint ignore=DL3059
RUN mkdir -p /aircrack-ng /output
COPY . /aircrack-ng
WORKDIR /aircrack-ng
# hadolint ignore=SC2006
RUN set -x \
&& make distclean || : && \
autoreconf -vif && \
set -e; \
./configure --with-experimental --with-ext-scripts --enable-maintainer-mode --prefix=/usr/local && \
make -j3 && \
set +e && \
if ! make check -j3; then \
echo "Processor: $(uname -m)"; \
for file in `grep -l "(exit status: [1-9]" test/*.log`; do \
echo "[*] Test ${file}:"; \
cat "${file}"; \
done; \
exit 1; \
fi && \
set -e && \
make install DESTDIR=/output
# Stage 2
# hadolint ignore=DL3006
FROM ${IMAGE_BASE}
# Due to the behavior of buildx failing to copy to directories being
# a symlink (whereas docker build works), copy the content to /output
# then manually move all the files in /usr/local
# In Arch-based distros, /usr/local/share/man is a symlink
RUN mkdir /output
COPY --from=builder /output/usr /output
# And another workaround for Clear Linux where this directory does not exist
# hadolint ignore=SC2015
RUN set -x && \
[ -d /usr/local/share/man ] || \
mkdir -p /usr/local/share/man
RUN mv /output/local/share/man/* /usr/local/share/man/ && \
rmdir /output/local/share/man/ && \
cp -r /output/* /usr/ && \
rm -rf /output
COPY docker_package_install.sh /
# Install dependencies
RUN set -x \
&& sh /docker_package_install.sh stage2 \
&& rm /docker_package_install.sh \
&& aircrack-ng -u
|
|
Explain the purpose of the module 'aircrack-ng/Dockerfile.release'. Describe how it is used in security workflows. Language: unknown.
|
ARG IMAGE_BASE=debian:unstable-slim
# hadolint ignore=DL3006
FROM ${IMAGE_BASE} AS builder
# https://docs.github.com/en/actions/learn-github-actions/environment-variables#default-environment-variables
# Tag name
ARG GITHUB_REF_NAME
# Install dependencies for building
COPY docker_package_install.sh /opt
RUN sh /opt/docker_package_install.sh builder
# Create git archive
# hadolint ignore=DL3059
RUN mkdir -p /aircrack-ng/git /aircrack-ng/archive /output
COPY . /aircrack-ng/git
WORKDIR /aircrack-ng/git
# hadolint ignore=DL4006,SC3040
RUN set -o pipefail && \
git archive --format=tar ${GITHUB_REF_NAME} \
| tar -xf - --directory /aircrack-ng/archive
# Build Aircrack-ng
WORKDIR /aircrack-ng/archive
RUN set -x \
&& make distclean || : && \
autoreconf -vif && \
set -e; \
./configure --with-experimental --with-ext-scripts --enable-maintainer-mode --without-opt --prefix=/usr && \
make -j3 && \
make check -j3 && \
make install DESTDIR=/output
# Stage 2
# hadolint ignore=DL3006
FROM ${IMAGE_BASE}
# Due to the behavior of buildx failing to copy to directories being
# a symlink (whereas docker build works), copy the content to /output
# then manually move all the files in /usr/local
# In Arch-based distros, /usr/local/share/man is a symlink
RUN mkdir /output
COPY --from=builder /output/usr /output
# And another workaround for Clear Linux where this directory does not exist
# hadolint ignore=SC2015
RUN set -x && \
[ -d /usr/local/share/man ] || \
mkdir -p /usr/local/share/man
RUN mv /output/local/share/man/* /usr/local/share/man/ && \
rmdir /output/local/share/man/ && \
cp -r /output/* /usr/ && \
rm -rf /output
COPY docker_package_install.sh /
# Install dependencies
RUN set -x \
&& sh /docker_package_install.sh stage2 \
&& rm /docker_package_install.sh \
&& aircrack-ng -u
|
|
Explain the purpose of the module 'aircrack-ng/docker_package_install.sh'. Describe how it is used in security workflows. Language: Shell Script.
|
#!/bin/sh
echo "[*] Installing packages"
STEP=$1
if [ -z "$STEP" ]; then
echo "[!] Must specify 'builder' or 'stage2' as arguments"
exit 1
elif [ "$STEP" = 'builder' ]; then
echo "[*] Builder step"
elif [ "$STEP" = 'stage2' ]; then
echo "[*] Stage2 step"
fi
# Load OS info
# shellcheck source=/dev/null
. /etc/os-release
if [ "${ID}" = 'debian' ] || [ "${ID_LIKE}" = 'debian' ]; then
[ "${ID_LIKE}" = 'debian' ] && echo "[*] Detected debian-based distro: ${ID} (${VERSION_ID})"
[ "${ID}" = 'debian' ] && echo "[*] Detected debian (${VERSION_CODENAME}/${VERSION_ID})"
if [ "${STEP}" = 'builder' ]; then
apt-get update \
&& export DEBIAN_FRONTEND=noninteractive \
&& apt-get -y install --no-install-recommends \
build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev \
ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre2-dev libhwloc-dev \
libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils expect gawk bear \
libtinfo5 python3-pip git && \
rm -rf /var/lib/apt/lists/*
elif [ "${STEP}" = 'stage2' ]; then
apt-get update && \
apt-get -y install --no-install-recommends \
libsqlite3-0 libssl3 hwloc libpcre2-posix3 libnl-3-200 libnl-genl-3-200 iw usbutils pciutils \
iproute2 ethtool kmod wget ieee-data python3 python3-graphviz rfkill && \
rm -rf /var/lib/apt/lists/*
fi
elif [ "${ID}" = 'arch' ] || [ "${ID_LIKE}" = 'arch' ]; then
[ "${ID}" = 'arch' ] && echo "[*] Detected Arch Linux"
[ "${ID_LIKE}" = 'arch' ] && echo "[*] Detected Arch-based Linux: ${NAME} (${ID})"
if [ "${STEP}" = 'builder' ]; then
pacman -Sy --noconfirm base-devel libnl openssl ethtool util-linux zlib libpcap sqlite pcre2 hwloc \
cmocka hostapd wpa_supplicant tcpdump screen iw usbutils pciutils expect git \
python python-setuptools
elif [ "${STEP}" = 'stage2' ]; then
pacman -Sy --noconfirm libnl openssl ethtool util-linux zlib libpcap sqlite pcre2 hwloc iw usbutils \
pciutils python-graphviz python
fi
elif [ "${ID}" = 'alpine' ]; then
echo "[*] Detected alpine"
if [ "${STEP}" = 'builder' ]; then
apk add --no-cache \
gcc g++ make autoconf automake libtool libnl3-dev openssl-dev ethtool libpcap-dev cmocka-dev \
hostapd wpa_supplicant tcpdump screen iw pkgconf util-linux sqlite-dev pcre2-dev linux-headers \
zlib-dev pciutils usbutils expect hwloc-dev git python3 expect gawk bear py3-pip
elif [ "${STEP}" = 'stage2' ]; then
apk add --no-cache \
libnl3 openssl ethtool libpcap util-linux sqlite-dev pcre2 zlib pciutils usbutils hwloc wget \
iproute2 kmod python3 py3-graphviz urfkill iw
fi
elif [ "${ID}" = 'fedora' ] || [ "${ID}" = 'almalinux' ] || [ "${ID}" = 'rocky' ] || [ "${ID}" = 'ol' ]; then
echo "[*] Distribution: ${NAME} (${VERSION_ID})"
LIBPCAP=libpcap-devel
CMOCKA=libcmocka-devel
dnf distrosync -y --refresh
if [ "${STEP}" = 'builder' ]; then
if [ "${ID}" = 'almalinux' ] || [ "${ID}" = 'rocky' ]; then
echo "[*] Install EPEL and enabling CRB"
dnf install epel-release dnf-plugins-core -y
dnf config-manager --set-enabled crb
dnf distrosync -y --refresh
elif [ "${ID}" = 'ol' ]; then
echo "[*] Install EPEL"
dnf install epel-release dnf-plugins-core -y
dnf install xz cmake gcc -y
LIBPCAP=libpcap
# We're installing cmocka manually, not present in repos
CMOCKA=""
dnf distrosync -y --refresh
cd /tmp || exit
curl https://cmocka.org/files/1.0/cmocka-1.0.1.tar.xz -o cmocka-1.0.1.tar.xz
tar -xf cmocka-1.0.1.tar.xz
cd cmocka-1.0.1 || exit
mkdir build
cd build || exit
cmake ..
make
make install
# Otherwise tests will fail because it cannot open the shared library
export LD_LIBRARY_PATH=/usr/local/lib:/usr/local/lib64
ldconfig
cd / || exit
fi
dnf install -y libtool pkgconfig sqlite-devel autoconf automake openssl-devel ${LIBPCAP} \
pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel ${CMOCKA} \
make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel \
expect python3-pip python3-setuptools git
elif [ "${STEP}" = 'stage2' ]; then
GRAPHVIZ=python3-graphviz
[ "${ID}" != 'fedora' ] && GRAPHVIZ=graphviz-python3
dnf install -y libnl3 openssl-libs zlib libpcap sqlite-libs pcre2 hwloc iw ethtool pciutils \
usbutils expect python3 ${GRAPHVIZ} iw util-linux ethtool kmod
fi
elif [ "${ID}" = 'opensuse-leap' ]; then
echo "[*] Detected openSUSE Leap"
if [ "${STEP}" = 'builder' ]; then
zypper install -y autoconf automake libtool pkg-config libnl3-devel libopenssl-1_1-devel zlib-devel \
libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd screen \
wpa_supplicant tcpdump iw gcc-c++ gcc ethtool pciutils usbutils expect python3-pip \
python3-setuptools git
elif [ "${STEP}" = 'stage2' ]; then
zypper install -y libnl3-200 libopenssl1_1 zlib libpcap sqlite3 libpcre2-8-0 hwloc iw ethtool pciutils \
usbutils expect python3 python3-graphviz iw util-linux ethtool kmod
fi
elif [ "${ID}" = 'gentoo' ]; then
echo "[*] Detected Gentoo"
if [ "${STEP}" = 'builder' ]; then
export EMERGE_DEFAULT_OPTS="--binpkg-respect-use=y --getbinpkg=y"
cat <<EOF >/etc/portage/binrepos.conf
[binhost]
priority = 9999
sync-uri = https://gentoo.osuosl.org/experimental/amd64/binpkg/default/linux/17.1/x86-64/
EOF
emerge --sync >/dev/null
emerge app-portage/elt-patches dev-db/sqlite dev-lang/python dev-libs/libbsd dev-libs/libnl dev-libs/libpcre2 \
dev-libs/openssl dev-vcs/git net-libs/libpcap net-wireless/iw net-wireless/lorcon sys-apps/hwloc \
net-wireless/wireless-tools sys-apps/ethtool sys-apps/hwdata sys-apps/pciutils sys-apps/usbutils \
sys-devel/autoconf sys-devel/automake sys-devel/gnuconfig sys-devel/libtool sys-libs/zlib
elif [ "${STEP}" = 'stage2' ]; then
export EMERGE_DEFAULT_OPTS="--binpkg-respect-use=y --getbinpkg=y"
cat <<EOF >/etc/portage/binrepos.conf
[binhost]
priority = 9999
sync-uri = https://gentoo.osuosl.org/experimental/amd64/binpkg/default/linux/17.1/x86-64/
EOF
emerge --sync >/dev/null
emerge dev-db/sqlite dev-lang/python dev-libs/libbsd dev-libs/libnl dev-libs/libpcre2 dev-libs/openssl \
net-libs/libpcap net-wireless/iw net-wireless/lorcon net-wireless/wireless-tools sys-apps/ethtool \
sys-apps/hwdata sys-apps/hwloc sys-apps/pciutils sys-apps/usbutils sys-libs/zlib app-portage/gentoolkit
eclean --deep distfiles && eclean --deep packages
emerge --depclean app-portage/gentoolkit
rm -fr /var/db/repos/gentoo /etc/portage/binrepos.conf
fi
elif [ "${ID}" = 'clear-linux-os' ]; then
echo "[*] Detected Clear Linux (${VERSION_ID})"
if [ "${STEP}" = 'builder' ]; then
# Build hostapd
swupd bundle-add wget c-basic devpkg-openssl devpkg-libnl
wget https://w1.fi/releases/hostapd-2.10.tar.gz
tar -zxf hostapd-2.10.tar.gz
cd hostapd-2.10/hostapd || exit 1
cp defconfig .config
make
make install
hostapd -v
# Install the rest of the packages
swupd bundle-add devpkg-libgcrypt devpkg-hwloc devpkg-libpcap
# Split it in multiple parts to avoid failure: "Error: Bundle too large by xxxxM"
swupd bundle-add devpkg-pcre2 devpkg-sqlite-autoconf git
swupd bundle-add ethtool network-basic software-testing
swupd bundle-add sysadmin-basic wpa_supplicant os-testsuite
elif [ "${STEP}" = 'stage2' ]; then
# Break it in multiple steps to avoid the issue mentioned above
swupd bundle-add libnl openssl devpkg-zlib devpkg-libpcap
swupd bundle-add sqlite devpkg-pcre2 hwloc network-basic ethtool
swupd bundle-add sysadmin-basic python-extras
fi
else
echo "[!] Unsupported distro: ${ID} - PR welcome"
exit 1
fi
# shellcheck disable=SC2181
if [ $? -ne 0 ]; then
echo '[!] ERROR, aborting'
exit 1
fi
exit 0
|
|
Explain the purpose of the module 'aircrack-ng/evalrev'. Describe how it is used in security workflows. Language: unknown.
|
#!/bin/sh
set -euf
DIR=${1:-}
CMD=${2:-}
SCM=""
if [ x$DIR = "x" ]
then
DIR="."
fi
if test -d "${DIR}/.git"; then
#
# Locate the closest annotated tag
#
REVISION="$(git describe --abbrev=0 --tags 2>/dev/null || echo unknown)"
#
# Determine if we are a development branch, if so then append the
# short SHA1.
#
EXACTLY="$(git describe --abbrev=0 --tags --exact-match 2>/dev/null || echo)"
if test -z "$EXACTLY"; then
REVISION="${REVISION}_rev-$(git rev-parse --verify --short HEAD)"
SCM="_rev-$(git rev-parse --verify --short HEAD)"
fi
elif test -d "${DIR}/.svn"; then
REVISION="_r$(svnversion $DIR 2> /dev/null | sed 's/[^0-9]*//g')"
SCM="_r$(svnversion $DIR 2> /dev/null | sed 's/[^0-9]*//g')"
if test x$REVISION = "x"; then
REVISION="_r$(svn info $DIR 2> /dev/null | grep -i revision | sed 's/[^0-9]*//g')"
SCM="_r$(svn info $DIR 2> /dev/null | grep -i revision | sed 's/[^0-9]*//g')"
fi
if test x$REVISION = "x"; then
if test -f "${DIR}/.svn/entries"; then
REVISION="_r$(cat ${DIR}/.svn/entries | grep -i revision | head -n 1 | sed 's/[^0-9]*//g')"
SCM="_r$(cat ${DIR}/.svn/entries | grep -i revision | head -n 1 | sed 's/[^0-9]*//g')"
fi
fi
if test x$REVISION = "x"; then
REVISION="_r1"
SCM="_r1"
fi
elif [ -n "${GITHUB_SHA}" ]; then
SHORT_SHA_REVISION="$(echo ${GITHUB_SHA} | cut -b 1-8)"
VERSION=$(cat ${DIR}/AC_VERSION 2>/dev/null)
REVISION="${VERSION}_rev-${SHORT_SHA_REVISION}"
SCM="_rev-${SHORT_SHA_REVISION}"
else
REVISION="$(cat ${DIR}/AC_VERSION 2>/dev/null)"
fi
if test "x$CMD" = "xscm"; then
echo $SCM
elif test "x$CMD" = "xquoted"; then
echo \"$REVISION\"
else
echo $REVISION
fi
|
|
Explain the purpose of the module 'aircrack-ng/INSTALLING'. Describe how it is used in security workflows. Language: unknown.
|
== Building ==
=== Requirements ===
* Autoconf
* Automake
* Libtool
* shtool
* OpenSSL development package or libgcrypt development package.
* Airmon-ng (Linux) requires ethtool, usbutils, and often pciutils.
* On Windows, cygwin has to be used and it also requires w32api package.
* On Windows, if using clang, libiconv and libiconv-devel
* Linux: LibNetlink 1 or 3. It can be disabled by passing --disable-libnl to configure.
* pkg-config (pkgconf on FreeBSD, DragonFlyBSD, OpenBSD and NetBSD)
* FreeBSD, DragonFlyBSD, OpenBSD, NetBSD, Solaris and OS X with Macports: gmake
* Linux/Cygwin: make and Standard C++ Library development package (Debian: libstdc++-dev)
Note: Airmon-ng only requires pciutils if the system has a PCI/PCIe bus and it is populated.
Such bus can be present even if not physically visible. For example, it is present,
and populated on the Raspberry Pi 4, therefore pciutils is required on that device.
=== Optional stuff ===
* If you want SSID filtering with regular expression in airodump-ng
(--essid-regex) PCRE or PCRE2 development package is required.
* If you want to use airolib-ng and '-r' option in aircrack-ng,
SQLite development package >= 3.3.17 (3.6.X version or better is recommended)
* If you want to use Airpcap, the 'developer' directory from the CD/ISO/SDK is required.
* In order to build besside-ng, besside-ng-crawler, easside-ng, tkiptun-ng and wesside-ng,
libpcap development package is required (on Cygwin, use the Airpcap SDK instead; see above)
* rfkill
* If you want Airodump-ng to log GPS coordinates, gpsd is needed
* For best performance on SMP machines, ensure the hwloc library and headers are installed. It is strongly recommended on high core count systems, it may give a serious speed boost
* CMocka for unit testing
* For integration testing on Linux only: tcpdump, HostAPd, WPA Supplicant and screen
=== Installing required and optional dependencies ===
Below are instructions for installing the basic requirements to build
`aircrack-ng` for a number of operating systems.
Note: CMocka, tcpdump, screen, HostAPd and WPA Supplicant should not be dependencies when packaging Aircrack-ng.
==== Linux ====
===== Arch Linux =====
`sudo pacman -Sy base-devel libnl openssl ethtool util-linux zlib libpcap sqlite pcre2 hwloc cmocka hostapd wpa_supplicant tcpdump screen iw usbutils pciutils`
===== Debian/Ubuntu =====
`sudo apt-get install build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre2-dev libhwloc-dev libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils`
==== Fedora ====
`sudo yum install libtool pkgconfig sqlite-devel autoconf automake openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel`
==== CentOS/RHEL 7 ====
`sudo yum install epel-release`
`sudo ./centos_autotools.sh`
# Remove older installation of automake/autoconf
`sudo yum remove autoconf automake`
`sudo yum install sqlite-devel openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel`
Note: autoconf, automake, libtool, and pkgconfig in the repositories are too old. The script centos_autotools.sh automatically installs dependencies to compile then install the tools.
==== CentOS/RHEL 8 ====
`sudo yum config-manager --set-enabled powertools`
`sudo yum install epel-release`
`sudo yum install git libtool pkgconfig sqlite-devel autoconf automake openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel`
===== openSUSE =====
`sudo zypper install autoconf automake libtool pkg-config libnl3-devel libopenssl-1_1-devel zlib-devel libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc ethtool pciutils usbutils`
===== Mageia =====
`sudo urpmi autoconf automake libtool pkgconfig libnl3-devel libopenssl-devel zlib-devel libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc make`
===== Alpine =====
`sudo apk add gcc g++ make autoconf automake libtool libnl3-dev openssl-dev ethtool libpcap-dev cmocka-dev hostapd wpa_supplicant tcpdump screen iw pkgconf util-linux sqlite-dev pcre2-dev linux-headers zlib-dev pciutils usbutils`
Note: Community repository needs to be enabled for iw
==== Clear Linux ====
`sudo swupd bundle-add c-basic devpkg-openssl devpkg-libnl devpkg-hwloc devpkg-libpcap devpkg-pcre2 devpkg-sqlite-autoconf ethtool wget network-basic software-testing sysadmin-basic wpa_supplicant`
Note: hostapd must be compiled manually, it is not present in the repository
==== BSD ====
===== FreeBSD =====
`pkg install pkgconf shtool libtool gcc9 automake autoconf pcre2 sqlite3 openssl gmake hwloc cmocka`
===== DragonflyBSD =====
`pkg install pkgconf shtool libtool gcc8 automake autoconf pcre2 sqlite3 libgcrypt gmake cmocka`
===== OpenBSD =====
`pkg_add pkgconf shtool libtool gcc automake autoconf pcre2 sqlite3 openssl gmake cmocka`
===== NetBSD =====
`pkg_add pkgconf libtool gcc7 automake autoconf pcre2 sqlite3 openssl gmake cmocka`
==== macOS ====
XCode, Xcode command line tools and HomeBrew are required.
`brew install autoconf automake libtool openssl shtool pkg-config hwloc pcre2 sqlite3 libpcap cmocka`
==== Windows ====
===== Cygwin =====
Cygwin requires the full path to the `setup.exe` utility, in order to
automate the installation of the necessary packages. In addition, it
requires the location of your installation, a path to the cached
packages download location, and a mirror URL.
An example of automatically installing all the dependencies
is as follows:
`c:\cygwin\setup-x86.exe -qnNdO -R C:/cygwin -s http://cygwin.mirror.constant.com -l C:/cygwin/var/cache/setup -P autoconf -P automake -P bison -P gcc-core -P gcc-g++ -P mingw-runtime -P mingw-binutils -P mingw-gcc-core -P mingw-gcc-g++ -P mingw-pthreads -P mingw-w32api -P libtool -P make -P python -P gettext-devel -P gettext -P intltool -P libiconv -P pkg-config -P git -P wget -P curl -P libpcre2-devel -P libssl-devel -P libsqlite3-devel`
===== MSYS2 =====
`pacman -Sy autoconf automake-wrapper libtool msys2-w32api-headers msys2-w32api-runtime gcc pkg-config git python openssl-devel openssl libopenssl msys2-runtime-devel gcc binutils make pcre2-devel libsqlite-devel`
=== Docker containers ===
We have two repositories on DockerHub:
- aircrackng/release (https://hub.docker.com/r/aircrackng/release): Each release
- aircrackng/git (https://hub.docker.com/r/aircrackng/git): every commit in the git repository
Base command for the git version:
`sudo docker run --rm -it aircrackng/git`
Available platforms/CPU architectures:
- linux/386 (base image: debian:unstable-slim)
- linux/amd64 (base image: debian:unstable-slim)
- linux/arm/v5 (base image: debian:unstable-slim)
- linux/arm/v6 (base image: alpine:3)
- linux/arm/v7 (base image: debian:unstable-slim)
- linux/arm64/v8 (base image: debian:unstable-slim)
- linux/mips64le (base image: debian:unstable-slim)
- linux/ppc64le (base image: debian:unstable-slim)
- linux/riscv64 (base image: debian:unstable-slim)
- linux/s390x (base image: debian:unstable-slim)
=== Compiling ===
To build `aircrack-ng`, the Autotools build system is utilized. Autotools replaces
the older method of compilation.
NOTE: If utilizing a developer version, eg: one checked out from source control,
you will need to run a pre-`configure` script. The script to use is one of the
following: `autoreconf -i` or `env NOCONFIGURE=1 ./autogen.sh`.
First, `./configure` the project for building with the appropriate options specified
for your environment:
`./configure <options>`
TIP: If the above fails, please see above about developer source control versions.
Next, compile the project (respecting if `make` or `gmake` is needed):
* Compilation:
`make`
* Compilation on *BSD or Solaris:
`gmake`
Finally, the additional targets listed below may be of use in your environment:
* Execute all unit testing:
`make check`
* Execute all integration testing (requires root):
`make integration`
* Installing:
`make install`
* Uninstall:
`make uninstall`
==== `./configure` flags ====
When configuring, the following flags can be used and combined to adjust the suite
to your choosing:
* with-airpcap=DIR: needed for supporting airpcap devices on windows (cygwin or msys2 only)
Replace DIR above with the absolute location to the root of the
extracted source code from the Airpcap CD or downloaded SDK available
online. Required on Windows to build besside-ng, besside-ng-crawler,
easside-ng, tkiptun-ng and wesside-ng when building experimental tools.
The developer pack (Compatible with version 4.1.1 and 4.1.3) can be downloaded at
https://support.riverbed.com/content/support/software/steelcentral-npm/airpcap.html
* with-experimental: needed to compile tkiptun-ng, easside-ng, buddy-ng, buddy-ng-crawler,
airventriloquist and wesside-ng. libpcap development package is also
required to compile most of the tools.
If not present, not all experimental tools will be built.
On Cygwin, libpcap is not present and the Airpcap SDK replaces it.
See --with-airpcap option above.
* with-ext-scripts: needed to build `airoscript-ng`, `versuck-ng`, `airgraph-ng` and
`airdrop-ng`.
Note: Each script has its own dependencies.
* with-gcrypt: Use libgcrypt crypto library instead of the default OpenSSL.
And also use internal fast sha1 implementation (borrowed from GIT).
Dependency (Debian): libgcrypt20-dev
* with-duma: Compile with DUMA support. DUMA is a library to detect buffer overruns and underruns.
Dependency (Debian): duma
* disable-libnl: Set up the project to be compiled without libnl (1 or 3). Linux option only.
* without-opt: Do not enable -O3 optimizations.
* enable-shared: Make a OSdep a shared library.
* disable-shared: When combined with enable-static, it will statically compile Aircrack-ng.
* with-avx512: On x86, add support for AVX512 instructions in aircrack-ng. Only use it when
the current CPU supports AVX512.
* with-static-simd=<SIMD>: Compile a single optimization in aircrack-ng binary. Useful when compiling
statically and/or for space-constrained devices. Valid SIMD options: x86-sse2,
x86-avx, x86-avx2, x86-avx512, ppc-altivec, ppc-power8, arm-neon, arm-asimd.
Must be used with --enable-static --disable-shared. When using those 2 options, the default
is to compile the generic optimization in the binary. --with-static-simd merely allows
to choose another one.
* --enable-maintainer-mode: It is important to enable this flag when
developing with Aircrack-ng. This flag enables
additional compile warnings and safety features.
===== Examples =====
* Configure and compiling:
`./configure --with-experimental`
`make`
* Compiling with gcrypt:
`./configure --with-gcrypt`
`make`
* Installing:
`make install`
* Installing (strip binaries):
`make install-strip`
* Installing, with external scripts:
`./configure --with-experimental --with-ext-scripts`
`make`
`make install`
* Testing (with sqlite, experimental and pcre2)
`./configure --with-experimental`
`make`
`make check`
* Compiling on OS X with macports (and all options):
`./configure --with-experimental`
`gmake`
* Compiling on macOS running on M1/AARCH64 and Homebrew:
`autoreconf -vif`
`env CPPFLAGS="-Wno-deprecated-declarations" ./configure --with-experimental`
`make`
`make check`
* Compiling on OS X 10.10 with XCode 7.1 and Homebrew:
`env CC=gcc-4.9 CXX=g++-4.9 ./configure`
`make`
`make check`
*NOTE*: Older XCode ships with a version of LLVM that does not support CPU feature
detection; which causes the `./configure` to fail. To work around this older LLVM,
it is required that a different compile suite is used, such as GCC or a newer LLVM
from Homebrew.
If you wish to use OpenSSL from Homebrew, you may need to specify the location
to its installation. To figure out where OpenSSL lives, run:
`brew --prefix openssl`
Use the output above as the DIR for `--with-openssl=DIR` in the `./configure` line:
`env CC=gcc-4.9 CXX=g++-4.9 ./configure --with-openssl=DIR`
`make`
`make check`
* Compiling on FreeBSD with gcc9
`env CC=gcc9 CXX=g++9 MAKE=gmake ./configure`
`gmake`
* Compiling on Cygwin with Airpcap (assuming Airpcap devpack is unpacked in Aircrack-ng directory)
```
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-osdep
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-crypto
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-util
dlltool -D Airpcap_Devpack/bin/x86/airpcap.dll -d build/airpcap.dll.def -l Airpcap_Devpack/bin/x86/libairpcap.dll.a
autoreconf -i
./configure --with-experimental --with-airpcap=$(pwd)
make
```
* Compiling on DragonflyBSD with gcrypt using GCC 8
```
autoreconf -i
env CC=gcc8 CXX=g++8 MAKE=gmake ./configure --with-experimental --with-gcrypt
gmake
```
* Compiling on OpenBSD (with autoconf 2.69 and automake 1.16)
```
export AUTOCONF_VERSION=2.69
export AUTOMAKE_VERSION=1.16
autoreconf -i
env MAKE=gmake ./configure
gmake
```
* Compiling and debugging aircrack-ng
```
export CFLAGS='-O0 -g'
export CXXFLAGS='-O0 -g'
./configure --with-experimental --enable-maintainer-mode --without-opt
make
LD_LIBRARY_PATH=.libs gdb --args ./aircrack-ng [PARAMETERS]
```
== IDE development ==
=== VS Code - devcontainers ===
A VS Code development environment is provided, as is, for rapid setup of a development environment. This additionally adds support for GitHub Codespaces.
==== Requirements ====
The first requirement is a working Docker Engine (https://docs.docker.com/engine/install/) environment.
Next, an installation of VS Code (https://code.visualstudio.com/) with the following extension(s):
- Remote - Containers: https://marketplace.visualstudio.com/items?itemName=ms-vscode-remote.remote-containers by Microsoft.
Note: The "Remote - Containers" extension will refuse to work with OSS Code.
==== Usage ====
1. Clone this repository to your working folder:
```
$ git clone --recursive https://github.com/aircrack-ng/aircrack-ng.git
$ cd aircrack-ng
```
2. After cloning this repository, open the folder inside VS Code.
```
$ code .
```
IMPORTANT: You should answer "Yes", if it asks if the folder should be opened inside a remote container. If it does not ask, then press `Ctrl+Shift+P` and type `open in container`. This should bring up the correct command, for which pressing enter will run said command.
3. A number of warnings might appear about a missing `compile_commands.json` file. These are safe to ignore for a moment, as this file is automatically generated after the initial compilation.
4. Now build the entire project by pressing `Ctrl+R` and selecting `Build Full` from the pop-up menu that appears.
5. VS Code should detect the `compile_commands.json` file and ask if it should be used; selecting "Yes, always" will complete the initial setup of a fully working IDE.
IMPORTANT: If it doesn't detect the file, pressing `Ctrl+Shift+P` and typing `reload window` will bring up the selection to fully reload the environment.
6. At this point, nearly all features of VS Code will function; from Intellisense, auto-completion, live documentation, to code formatting. Additionally, there are pre-configured tasks for builds and tests, as well as an example GDB/LLDB configuration for debugging `aircrack-ng`.
== Packaging ==
Automatic detection of CPU optimization is done at run time. This behavior
**is** desirable when packaging Aircrack-ng (for a Linux or other distribution.)
Also, in some cases it may be desired to provide your own flags completely and
not having the suite auto-detect a number of optimizations. To do this, add
the additional flag `--without-opt` to the `./configure` line:
`./configure --without-opt`
== Using pre-compiled binaries ==
=== Linux/BSD ===
Aircrack-ng is available in most distributions repositories. However, it is not always up-to-date.
=== Windows ===
* Install the appropriate "monitor" driver for your card; standard drivers don't work for capturing data.
* Aircrack-ng suite is command line tools. So, you have to open a command-line
`Start menu -> Run... -> cmd.exe` then use them
* Run the executables without any parameters to have help
== Documentation ==
Some more information is present in the README file.
Documentation, tutorials, ... can be found on https://aircrack-ng.org
Support is available in the GitHub Discussions (https://github.com/aircrack-ng/aircrack-ng/discussions) and on IRC (in #aircrack-ng on Libera Chat).
Every tool has its own manpage. For aircrack-ng, `man aircrack-ng`
|
|
Explain the purpose of the module 'aircrack-ng/LICENSE'. Describe how it is used in security workflows. Language: unknown.
|
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your
freedom to share and change it. By contrast, the GNU General Public
License is intended to guarantee your freedom to share and change free
software--to make sure the software is free for all its users. This
General Public License applies to most of the Free Software
Foundation's software and to any other program whose authors commit to
using it. (Some other Free Software Foundation software is covered by
the GNU Library General Public License instead.) You can apply it to
your programs, too.
When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
this service if you wish), that you receive source code or can get it
if you want it, that you can change the software or use pieces of it
in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid
anyone to deny you these rights or to ask you to surrender the rights.
These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether
gratis or for a fee, you must give the recipients all the rights that
you have. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their
rights.
We protect your rights with two steps: (1) copyright the software, and
(2) offer you this license which gives you legal permission to copy,
distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain
that everyone understands that there is no warranty for this free
software. If the software is modified by someone else and passed on, we
want its recipients to know that what they have is not the original, so
that any problems introduced by others will not reflect on the original
authors' reputations.
Finally, any free program is threatened constantly by software
patents. We wish to avoid the danger that redistributors of a free
program will individually obtain patent licenses, in effect making the
program proprietary. To prevent this, we have made it clear that any
patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and
modification follow.
GNU GENERAL PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains
a notice placed by the copyright holder saying it may be distributed
under the terms of this General Public License. The "Program", below,
refers to any such program or work, and a "work based on the Program"
means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it,
either verbatim or with modifications and/or translated into another
language. (Hereinafter, translation is included without limitation in
the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope. The act of
running the Program is not restricted, and the output from the Program
is covered only if its contents constitute a work based on the
Program (independent of having been made by running the Program).
Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's
source code as you receive it, in any medium, provided that you
conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the
notices that refer to this License and to the absence of any warranty;
and give any other recipients of the Program a copy of this License
along with the Program.
You may charge a fee for the physical act of transferring a copy, and
you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion
of it, thus forming a work based on the Program, and copy and
distribute such modifications or work under the terms of Section 1
above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices
stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in
whole or in part contains or is derived from the Program or any
part thereof, to be licensed as a whole at no charge to all third
parties under the terms of this License.
c) If the modified program normally reads commands interactively
when run, you must cause it, when started running for such
interactive use in the most ordinary way, to print or display an
announcement including an appropriate copyright notice and a
notice that there is no warranty (or else, saying that you provide
a warranty) and that users may redistribute the program under
these conditions, and telling the user how to view a copy of this
License. (Exception: if the Program itself is interactive but
does not normally print such an announcement, your work based on
the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If
identifiable sections of that work are not derived from the Program,
and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those
sections when you distribute them as separate works. But when you
distribute the same sections as part of a whole which is a work based
on the Program, the distribution of the whole must be on the terms of
this License, whose permissions for other licensees extend to the
entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest
your rights to work written entirely by you; rather, the intent is to
exercise the right to control the distribution of derivative or
collective works based on the Program.
In addition, mere aggregation of another work not based on the Program
with the Program (or with a work based on the Program) on a volume of
a storage or distribution medium does not bring the other work under
the scope of this License.
3. You may copy and distribute the Program (or a work based on it,
under Section 2) in object code or executable form under the terms of
Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable
source code, which must be distributed under the terms of Sections
1 and 2 above on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three
years, to give any third party, for a charge no more than your
cost of physically performing source distribution, a complete
machine-readable copy of the corresponding source code, to be
distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer
to distribute corresponding source code. (This alternative is
allowed only for noncommercial distribution and only if you
received the program in object code or executable form with such
an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for
making modifications to it. For an executable work, complete source
code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to
control compilation and installation of the executable. However, as a
special exception, the source code distributed need not include
anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the
operating system on which the executable runs, unless that component
itself accompanies the executable.
If distribution of executable or object code is made by offering
access to copy from a designated place, then offering equivalent
access to copy the source code from the same place counts as
distribution of the source code, even though third parties are not
compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program
except as expressly provided under this License. Any attempt
otherwise to copy, modify, sublicense or distribute the Program is
void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under
this License will not have their licenses terminated so long as such
parties remain in full compliance.
5. You are not required to accept this License, since you have not
signed it. However, nothing else grants you permission to modify or
distribute the Program or its derivative works. These actions are
prohibited by law if you do not accept this License. Therefore, by
modifying or distributing the Program (or any work based on the
Program), you indicate your acceptance of this License to do so, and
all its terms and conditions for copying, distributing or modifying
the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the
original licensor to copy, distribute or modify the Program subject to
these terms and conditions. You may not impose any further
restrictions on the recipients' exercise of the rights granted herein.
You are not responsible for enforcing compliance by third parties to
this License.
7. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues),
conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot
distribute so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you
may not distribute the Program at all. For example, if a patent
license would not permit royalty-free redistribution of the Program by
all those who receive copies directly or indirectly through you, then
the only way you could satisfy both it and this License would be to
refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under
any particular circumstance, the balance of the section is intended to
apply and the section as a whole is intended to apply in other
circumstances.
It is not the purpose of this section to induce you to infringe any
patents or other property right claims or to contest validity of any
such claims; this section has the sole purpose of protecting the
integrity of the free software distribution system, which is
implemented by public license practices. Many people have made
generous contributions to the wide range of software distributed
through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing
to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to
be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in
certain countries either by patents or by copyrighted interfaces, the
original copyright holder who places the Program under this License
may add an explicit geographical distribution limitation excluding
those countries, so that distribution is permitted only in or among
countries not thus excluded. In such case, this License incorporates
the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions
of the General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
Each version is given a distinguishing version number. If the Program
specifies a version number of this License which applies to it and "any
later version", you have the option of following the terms and conditions
either of that version or of any later version published by the Free
Software Foundation. If the Program does not specify a version number of
this License, you may choose any version ever published by the Free Software
Foundation.
10. If you wish to incorporate parts of the Program into other free
programs whose distribution conditions are different, write to the author
to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes
make exceptions for this. Our decision will be guided by the two goals
of preserving the free status of all derivatives of our free software and
of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest
to attach them to the start of each source file to most effectively
convey the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this
when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License. Of course, the commands you use may
be called something other than `show w' and `show c'; they could even be
mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your
school, if any, to sign a "copyright disclaimer" for the program, if
necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
`Gnomovision' (which makes passes at compilers) written by James Hacker.
<signature of Ty Coon>, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into
proprietary programs. If your program is a subroutine library, you may
consider it more useful to permit linking proprietary applications with the
library. If this is what you want to do, use the GNU Library General
Public License instead of this License.
|
|
Explain the purpose of the module 'aircrack-ng/LICENSE.OpenSSL'. Describe how it is used in security workflows. Language: unknown.
|
LICENSE ISSUES
==============
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of
the OpenSSL License and the original SSLeay license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style
Open Source licenses. In case of any license issues related to OpenSSL
please contact openssl-core@openssl.org.
OpenSSL License
---------------
/* ====================================================================
* Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* openssl-core@openssl.org.
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This product includes cryptographic software written by Eric Young
* (eay@cryptsoft.com). This product includes software written by Tim
* Hudson (tjh@cryptsoft.com).
*
*/
Original SSLeay License
-----------------------
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young (eay@cryptsoft.com).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long as
* the following conditions are aheared to. The following conditions
* apply to all code found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
* included with this distribution is covered by the same copyright terms
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
*
* Copyright remains Eric Young's, and as such any Copyright notices in
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young (eay@cryptsoft.com)"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
|
|
Explain the purpose of the module 'aircrack-ng/Makefile.am'. Describe how it is used in security workflows. Language: unknown.
|
# Aircrack-ng
#
# Copyright (C) 2017 Joseph Benden <joe@benden.us>
#
# Autotool support was written by: Joseph Benden <joe@benden.us>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
#
# In addition, as a special exception, the copyright holders give
# permission to link the code of portions of this program with the
# OpenSSL library under certain conditions as described in each
# individual source file, and distribute linked combinations
# including the two.
#
# You must obey the GNU General Public License in all respects
# for all of the code used other than OpenSSL.
#
# If you modify file(s) with this exception, you may extend this
# exception to your dnl version of the file(s), but you are not obligated
# to do so.
#
# If you dnl do not wish to do so, delete this exception statement from your
# version.
#
# If you delete this exception statement from all source files in the
# program, then also delete it here.
AM_MAKEFLAGS = --no-print-directory
ACLOCAL_AMFLAGS = -I build/m4/stubs -I build/m4
SUBDIRS = manpages \
scripts
AM_CPPFLAGS = -I$(abs_srcdir) \
-I$(abs_builddir)/include \
-I$(abs_srcdir)/include \
-I$(abs_builddir)/lib \
-I$(abs_srcdir)/lib \
-I$(abs_builddir)/lib/radiotap \
-I$(abs_srcdir)/lib/radiotap \
$(CRYPTO_INCLUDES) \
$(CODE_COVERAGE_CPPFLAGS)
CFLAGS += $(CODE_COVERAGE_CFLAGS)
CXXFLAGS += $(CODE_COVERAGE_CXXFLAGS)
LIBS += $(CODE_COVERAGE_LIBS)
COMMON_CFLAGS = $(PTHREAD_CFLAGS) $(CRYPTO_CFLAGS) $(ZLIB_CFLAGS)
COMMON_LDADD = $(PTHREAD_LIBS) $(CRYPTO_LDFLAGS) $(CRYPTO_LIBS) $(ZLIB_LIBS)
bin_PROGRAMS =
sbin_PROGRAMS =
noinst_LTLIBRARIES =
lib_LTLIBRARIES =
EXTRA_DIST = AC_VERSION
check_PROGRAMS =
TESTS =
INTEGRATION_TESTS =
LIBACCRYPTO_LIBS = libaccrypto.la
LIBAIRCRACK_CE_WEP_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wep.la
LIBAIRCRACK_LIBS = libaircrack.la
LIBAIRCRACK_OSDEP_LIBS= libaircrack-osdep.la
if CYGWIN
LIBAIRCRACK_OSDEP_LIBS+= -liphlpapi -lsetupapi
endif
LIBCOWPATTY_LIBS = libcowpatty.la
LIBPTW_LIBS = libptw.la
LIBRADIOTAP_LIBS = libradiotap.la
LIBAIRCRACK_CE_WPA_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa.la
LIBAIRCRACK_CE_WPA_X86_AVX512_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-x86-avx512.la
LIBAIRCRACK_CE_WPA_X86_AVX2_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-x86-avx2.la
LIBAIRCRACK_CE_WPA_X86_AVX_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-x86-avx.la
LIBAIRCRACK_CE_WPA_X86_SSE2_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-x86-sse2.la
LIBAIRCRACK_CE_WPA_ARM_NEON_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-arm-neon.la
LIBAIRCRACK_CE_WPA_PPC_ALTIVEC_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-ppc-altivec.la
LIBAIRCRACK_CE_WPA_PPC_POWER8_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-ppc-power8.la
LIBAIRCRACK_CE_WPA_PATH = $(abs_top_builddir)/
include $(top_srcdir)/Makefile.integration.mk
include $(top_srcdir)/include/Makefile.inc
include $(top_srcdir)/lib/Makefile.inc
include $(top_srcdir)/src/Makefile.inc
include $(top_srcdir)/test/Makefile.inc
include $(top_srcdir)/aminclude_static.am
clean-local: code-coverage-clean
distclean-local: code-coverage-dist-clean
dist-hook:
$(AM_V_GEN)echo $(VERSION) > $(distdir)/AC_VERSION
|
|
Explain the purpose of the module 'aircrack-ng/Makefile.integration.mk'. Describe how it is used in security workflows. Language: unknown.
|
INTEGRATION_TEST_SUITE_LOG = integration-test-suite.log
am__set_INTEGRATION_TESTS_bases = \
bases='$(INTEGRATION_TEST_LOGS)'; \
bases=`for i in $$bases; do echo $$i; done | sed 's/\.log$$//'`; \
bases=`echo $$bases`
am__integration_test_logs1 = $(INTEGRATION_TESTS:=.log)
INTEGRATION_TEST_LOGS = $(am__integration_test_logs1:.log=.log)
# Leading 'am--fnord' is there to ensure the list of targets does not
# expand to empty, as could happen e.g. with make check TESTS=''.
am--fnord $(INTEGRATION_TEST_LOGS) $(INTEGRATION_TEST_LOGS:.log=.trs): $(am__force_recheck)
$(INTEGRATION_TEST_SUITE_LOG): $(INTEGRATION_TEST_LOGS)
@$(am__set_INTEGRATION_TESTS_bases); \
am__f_ok () { test -f "$$1" && test -r "$$1"; }; \
redo_bases=`for i in $$bases; do \
am__f_ok $$i.trs && am__f_ok $$i.log || echo $$i; \
done`; \
if test -n "$$redo_bases"; then \
redo_logs=`for i in $$redo_bases; do echo $$i.log; done`; \
redo_results=`for i in $$redo_bases; do echo $$i.trs; done`; \
if $(am__make_dryrun); then :; else \
rm -f $$redo_logs && rm -f $$redo_results || exit 1; \
fi; \
fi; \
if test -n "$$am__remaking_logs"; then \
echo "fatal: making $(INTEGRATION_TEST_SUITE_LOG): possible infinite" \
"recursion detected" >&2; \
elif test -n "$$redo_logs"; then \
am__remaking_logs=yes $(MAKE) $(AM_MAKEFLAGS) $$redo_logs; \
fi; \
if $(am__make_dryrun); then :; else \
st=0; \
errmsg="fatal: making $(INTEGRATION_TEST_SUITE_LOG): failed to create"; \
for i in $$redo_bases; do \
test -f $$i.trs && test -r $$i.trs \
|| { echo "$$errmsg $$i.trs" >&2; st=1; }; \
test -f $$i.log && test -r $$i.log \
|| { echo "$$errmsg $$i.log" >&2; st=1; }; \
done; \
test $$st -eq 0 || exit 1; \
fi
@$(am__sh_e_setup); $(am__tty_colors); $(am__set_INTEGRATION_TESTS_bases); \
ws='[ ]'; \
results=`for b in $$bases; do echo $$b.trs; done`; \
test -n "$$results" || results=/dev/null; \
all=` grep "^$$ws*:test-result:" $$results | wc -l`; \
pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \
fail=` grep "^$$ws*:test-result:$$ws*FAIL" $$results | wc -l`; \
skip=` grep "^$$ws*:test-result:$$ws*SKIP" $$results | wc -l`; \
xfail=`grep "^$$ws*:test-result:$$ws*XFAIL" $$results | wc -l`; \
xpass=`grep "^$$ws*:test-result:$$ws*XPASS" $$results | wc -l`; \
error=`grep "^$$ws*:test-result:$$ws*ERROR" $$results | wc -l`; \
if test `expr $$fail + $$xpass + $$error` -eq 0; then \
success=true; \
else \
success=false; \
fi; \
br='==================='; br=$$br$$br$$br$$br; \
result_count () \
{ \
if test x"$$1" = x"--maybe-color"; then \
maybe_colorize=yes; \
elif test x"$$1" = x"--no-color"; then \
maybe_colorize=no; \
else \
echo "$@: invalid 'result_count' usage" >&2; exit 4; \
fi; \
shift; \
desc=$$1 count=$$2; \
if test $$maybe_colorize = yes && test $$count -gt 0; then \
color_start=$$3 color_end=$$std; \
else \
color_start= color_end=; \
fi; \
echo "$${color_start}# $$desc $$count$${color_end}"; \
}; \
create_testsuite_report () \
{ \
result_count $$1 "TOTAL:" $$all "$$brg"; \
result_count $$1 "PASS: " $$pass "$$grn"; \
result_count $$1 "SKIP: " $$skip "$$blu"; \
result_count $$1 "XFAIL:" $$xfail "$$lgn"; \
result_count $$1 "FAIL: " $$fail "$$red"; \
result_count $$1 "XPASS:" $$xpass "$$red"; \
result_count $$1 "ERROR:" $$error "$$mgn"; \
}; \
{ \
echo "$(PACKAGE_STRING): $(subdir)/$(INTEGRATION_TEST_SUITE_LOG)" | \
$(am__rst_title); \
create_testsuite_report --no-color; \
echo; \
echo ".. contents:: :depth: 2"; \
echo; \
for b in $$bases; do echo $$b; done \
| $(am__create_global_log); \
} >$(INTEGRATION_TEST_SUITE_LOG).tmp || exit 1; \
mv $(INTEGRATION_TEST_SUITE_LOG).tmp $(INTEGRATION_TEST_SUITE_LOG); \
if $$success; then \
col="$$grn"; \
else \
col="$$red"; \
test x"$$VERBOSE" = x || cat $(INTEGRATION_TEST_SUITE_LOG); \
fi; \
echo "$${col}$$br$${std}"; \
echo "$${col}Integration test-suite summary for $(PACKAGE_STRING)$${std}"; \
echo "$${col}$$br$${std}"; \
create_testsuite_report --maybe-color; \
echo "$$col$$br$$std"; \
if $$success; then :; else \
echo "$${col}See $(subdir)/$(INTEGRATION_TEST_SUITE_LOG)$${std}"; \
if test -n "$(PACKAGE_BUGREPORT)"; then \
echo "$${col}Please report to $(PACKAGE_BUGREPORT)$${std}"; \
fi; \
echo "$$col$$br$$std"; \
fi; \
$$success || exit 1
integration-TESTS:
@list='$(RECHECK_LOGS)'; test -z "$$list" || rm -f $$list
@list='$(RECHECK_LOGS:.log=.trs)'; test -z "$$list" || rm -f $$list
@test -z "$(INTEGRATION_TEST_SUITE_LOG)" || rm -f $(INTEGRATION_TEST_SUITE_LOG)
@set +e; $(am__set_INTEGRATION_TESTS_bases); \
log_list=`for i in $$bases; do echo $$i.log; done`; \
trs_list=`for i in $$bases; do echo $$i.trs; done`; \
log_list=`echo $$log_list`; trs_list=`echo $$trs_list`; \
for b in $$bases; do \
p='$$b$(EXEEXT)'; \
$(am__check_pre) $(LOG_DRIVER) --test-name "$$b" \
--log-file $$b.log --trs-file $$b.trs \
$(am__common_driver_flags) $(AM_LOG_DRIVER_FLAGS) $(LOG_DRIVER_FLAGS) -- $(LOG_COMPILE) \
"$$b" $(AM_TESTS_FD_REDIRECT); \
done; \
$(MAKE) $(AM_MAKEFLAGS) $(INTEGRATION_TEST_SUITE_LOG) TEST_LOGS="$$log_list"; \
exit $$?;
integration:
$(MAKE) $(AM_MAKEFLAGS) $(check_PROGRAMS) $(integration_PROGRAMS)
$(MAKE) $(AM_MAKEFLAGS) integration-TESTS
mostlyclean-local:
-test -z "$(INTEGRATION_TEST_LOGS)" || rm -f $(INTEGRATION_TEST_LOGS)
-test -z "$(INTEGRATION_TEST_LOGS:.log=.trs)" || rm -f $(INTEGRATION_TEST_LOGS:.log=.trs)
-test -z "$(INTEGRATION_TEST_SUITE_LOG)" || rm -f $(INTEGRATION_TEST_SUITE_LOG)
|
|
Explain the purpose of the module 'aircrack-ng/README'. Describe how it is used in security workflows. Language: unknown.
|
Documentation, tutorials, ... can be found on https://www.aircrack-ng.org
See also manpages and the forum (GitHub Discussions).
Installing
==========
This version has more dependencies/libraries required than previous versions to be compiled.
See INSTALLING file for more information
OpenWrt Devices
===============
You can use airodump-ng on OpenWrt devices. You'll have to use specify
prism0 as interface. Airodump-ng will automatically create it.
Rq: Aireplay DOESN'T work on OpenWrt (2.4 kernel) with broadcom chipset since the driver doesn't support injection. It *may* work with 2.6 kernels >= 2.6.24 (kamikaze 8.09+ custom-built).
Known bugs:
===========
Drivers
-------
Madwifi-ng
----------
The cause of most of these problems (1, 2 and 3) is that Madwifi-ng cannot easily change the rate in monitor mode.
Technically, when changing rate while in monitor mode, the raw socket gets invalidated and we have to get it again.
Madwifi-ng is getting replaced by several drivers: ath5k, ath9k and ar9170.
Problem 1: No client can associate to an airbase soft AP.
Solution: Use a more recent driver. Madwifi-ng has been deprecated for years.
Problem 2: When changing rate while you are capturing packet makes airodump-ng stall
Solution 2: Restart airodump-ng or change rate before starting it.
Problem 3: After some time it stops capturing packets and you're really sure no network manager are running at all.
Solution 3: That's a known bug in the driver, it may happen at any time (the time before it fails can vary a lot:
from 5 minutes to 50 or even more). Try (as root) unloading completely the driver with 'madwifi-unload'
and then run 'modprobe ath_pci autocreate=monitor'.
Problem 4: When creating a new VAP airodump-ng takes up to 10-15 seconds to see the first packet
Solution 4: It's the behavior of madwifi-ng, don't worry (... be happy ;)).
Orinoco
-------
Problem: BSSID is not reported correctly or is 00:00:00:00:00:00 or signal is not reported correctly.
Solution: None. Consider replacing your card, orinoco is really really old.
Aircrack-ng
-----------
Aireplay-ng
-----------
Problem: Fakeauth on a WRT54G with WEP (shared authentication) doesn't work.
Solution: None at this time (we'll try to fix it in an upcoming release).
Airolib-ng
----------
Problem: On windows only, opening/creating a database doesn't work when airolib-ng is in directories containing
special characters like 'ç', 'é', 'è', 'à', ... (directories containing spaces are not affected).
Reason: It's a SQLite issue.
Solution: Rename the directory or move the database into another directory.
Airodump-ng
-----------
Problem: Airodump-ng stop working after some time.
Solution 1: You may have a network manager running that puts back the card in managed mode.
You'll have to disable it (the fastest solution is killing the process) then restart airodump-ng.
Solution 2: See Problem 3 of Madwifi-ng.
Problem: On windows, it doesn't display a list of adapters like the old 0.X
Solution: It requires you to develop your own DLL.
Problem: Handshake is not captured/detected
Reason: You might be too far and your signal is bad (or too close with a signal too strong).
Another possibility is that Airodump-ng didn't detect the handshake properly due to
being far apart in the capture.
Solution 1: Check out our tutorial 'WPA Packet Capture Explained' in the wiki.
Solution 2: Try running Aircrack-ng on your capture, it might detect the capture.
Solution 3: Check out our wpaclean tool.
Note: It will be fixed in an upcoming release.
Cygwin
------
Problem: /usr/include/sys/reent.h:14:20: fatal error: stddef.h: No such file or directory
Solution: It happens because the gcc and g++ version are different. Make sure they are the same.
Sample files
============
wep.open.system.authentication.cap:
It shows a connection (authentication then association) to a WEP network (open authentication).
wep.shared.key.authentication.cap:
It shows a connection (authentication then association to a WEP network (shared authentication).
The difference with open authentication is that the client has to encrypt a challenge text
and send it back (encrypted) to the AP to prove it has the right key.
wpa.cap:
This is a sample file with a WPA handshake. It is located in the test/ directory of the install files.
The passphrase is 'biscotte'. Use the password file (password.lst) which is in the same directory.
wpa2.eapol.cap:
This is a sample file with a WPA2 handshake.
It is located in the test/ directory of the install files.
The passphrase is '12345678'. Use the password file (password.lst) which is in the same directory.
test.ivs (http://download.aircrack-ng.org/wiki-files/other/test.ivs):
This is a 128 bit WEP key file.
The key is AE:5B:7F:3A:03:D0:AF:9B:F6:8D:A5:E2:C7.
wep_64_ptw.cap (http://dl.aircrack-ng.org/ptw.cap):
This is a 64 bit WEP key file suitable for the PTW method.
The key is '1F:1F:1F:1F:1F'.
wpa-psk-linksys.cap:
This is a sample file with a WPA1 handshake along with some encrypted packets.
Useful for testing with airdecap-ng. The password is 'dictionary'.
wpa2-psk-linksys.cap:
This is a sample file with a WPA2 handshake along with some encrypted packets.
Useful for testing with airdecap-ng. The password is 'dictionary'.
wps2.0.pcap:
This is a test file with WPS 2.0 beacon.
password.lst and password-2.lst:
This is a sample wordlist for WPA key cracking. More wordlists can be found at
https://www.aircrack-ng.org/doku.php?id=faq#where_can_i_find_good_wordlists
password.db
This is a sample airolib-ng database for WPA key cracking.
pingreply.c
Replies to all ping requests. Useful for testing sniffing/injecting packets with airtun-ng.
Chinese-SSID-Name.pcap
Contains a beacon with an SSID displayed in Chinese.
verify_inject.py
Testing DNS requests using airtun-ng.
n-02.cap:
This is a test file with 802.11X-2004 AES-128-CMAC handshake.
Useful for testing with aircrack-ng. The password is 'bo$$password'.
test-pmkid.pcap:
This is a test file with PMKID. Passphrase for 'WLAN-771698' is 'SP-91862D361'
test1.pcap:
This is another test file with PMKID. Passphrase for the network
'ogogo' is '15211521'
StayAlfred.hccapx:
Hashcat HCCAPx file with WPA handshake.
Passphrase for 'StayAlfred' ESSID is 'staytogether'
wpa3-psk.pcap:
WPA3 PSK SAE authentication. Passphrase for the network
'WPA3-Network' is 'abcdefgh'
More sample pcap are available from Wireshark:
https://wiki.wireshark.org/SampleCaptures#Wifi_.2F_Wireless_LAN_captures_.2F_802.11
|
|
Explain the purpose of the module 'aircrack-ng/README.md'. Describe how it is used in security workflows. Language: Markdown.
|
# Aircrack-ng
## Badges
### GitHub CI
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/almalinux.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/alpine.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/dragonflybsd.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/freebsd.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/kali.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/linux.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/linux-pcre.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/macos.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/netbsd.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/openbsd.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/windows.yml)
### Others
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/scanbuild.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/codespell.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/coverity.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/docker.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/markdown-link.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/pvs-studio.yml)
[](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/style.yml)
### Repository versions










## Description
Aircrack-ng is a complete suite of tools to assess WiFi network security.
It focuses on different areas of WiFi security:
* Monitoring: Packet capture and export of data to text files for further processing by third party tools.
* Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
* Testing: Checking WiFi cards and driver capabilities (capture and injection).
* Cracking: WEP and WPA PSK (WPA 1 and 2).
All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily on Linux but also Windows, macOS, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2.
# Building
## Requirements
* Autoconf
* Automake
* Libtool
* shtool
* OpenSSL development package or libgcrypt development package.
* Airmon-ng (Linux) requires ethtool, usbutils, and often pciutils.
* On Windows, cygwin has to be used and it also requires w32api package.
* On Windows, if using clang, libiconv and libiconv-devel
* Linux: LibNetlink 1 or 3. It can be disabled by passing --disable-libnl to configure.
* pkg-config (pkgconf on FreeBSD, DragonFlyBSD, OpenBSD and NetBSD)
* FreeBSD, DragonFlyBSD, OpenBSD, NetBSD, Solaris and OS X with Macports: gmake
* Linux/Cygwin: make and Standard C++ Library development package (Debian: libstdc++-dev)
Note: Airmon-ng only requires pciutils if the system has a PCI/PCIe bus and it is populated.
Such bus can be present even if not physically visible. For example, it is present,
and populated on the Raspberry Pi 4, therefore pciutils is required on that device.
## Optional stuff
* If you want SSID filtering with regular expression in airodump-ng
(--essid-regex) PCRE or PCRE2 development package is required.
* If you want to use airolib-ng and '-r' option in aircrack-ng,
SQLite development package >= 3.3.17 (3.6.X version or better is recommended)
* If you want to use Airpcap, the 'developer' directory from the CD/ISO/SDK is required.
* In order to build `besside-ng`, `besside-ng-crawler`, `easside-ng`, `tkiptun-ng` and `wesside-ng`,
libpcap development package is required (on Cygwin, use the Airpcap SDK instead; see above)
* rfkill
* If you want Airodump-ng to log GPS coordinates, gpsd is needed
* For best performance on SMP machines, ensure the hwloc library and headers are installed. It is strongly recommended on high core count systems, it may give a serious speed boost
* CMocka and expect for testing
* For integration testing on Linux only: tcpdump, HostAPd, WPA Supplicant and screen
## Installing required and optional dependencies
Below are instructions for installing the basic requirements to build
`aircrack-ng` for a number of operating systems.
**Note**: CMocka, tcpdump, screen, HostAPd and WPA Supplicant should not be dependencies when packaging Aircrack-ng.
### Linux
#### Arch Linux
sudo pacman -Sy base-devel libnl openssl ethtool util-linux zlib libpcap sqlite pcre2 hwloc cmocka hostapd wpa_supplicant tcpdump screen iw usbutils pciutils expect
#### Debian/Ubuntu
sudo apt-get install build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre2-dev libhwloc-dev libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils expect
#### Fedora
sudo yum install libtool pkgconfig sqlite-devel autoconf automake openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel expect
#### CentOS/RHEL 7
sudo yum install epel-release
sudo ./centos_autotools.sh
# Remove older installation of automake/autoconf
sudo yum remove autoconf automake
sudo yum install sqlite-devel openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel
**Note**: autoconf, automake, libtool, and pkgconfig in the repositories are too old. The script centos_autotools.sh automatically installs dependencies to compile then install the tools.
#### CentOS/RHEL 8
sudo yum config-manager --set-enabled powertools
sudo yum install epel-release
sudo yum install libtool pkgconfig sqlite-devel autoconf automake openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel
#### openSUSE
sudo zypper install autoconf automake libtool pkg-config libnl3-devel libopenssl-1_1-devel zlib-devel libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc ethtool pciutils usbutils expect
#### Mageia
sudo urpmi autoconf automake libtool pkgconfig libnl3-devel libopenssl-devel zlib-devel libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc make expect
#### Alpine
sudo apk add gcc g++ make autoconf automake libtool libnl3-dev openssl-dev ethtool libpcap-dev cmocka-dev hostapd wpa_supplicant tcpdump screen iw pkgconf util-linux sqlite-dev pcre2-dev linux-headers zlib-dev pciutils usbutils expect
**Note**: Community repository needs to be enabled for iw
#### Clear Linux
sudo swupd bundle-add c-basic devpkg-openssl devpkg-libgcrypt devpkg-libnl devpkg-hwloc devpkg-libpcap devpkg-pcre2 devpkg-sqlite-autoconf ethtool wget network-basic software-testing sysadmin-basic wpa_supplicant os-testsuite
**Note**: hostapd must be compiled manually, it is not present in the repository
### BSD
#### FreeBSD
pkg install pkgconf shtool libtool gcc9 automake autoconf pcre2 sqlite3 openssl gmake hwloc cmocka
#### DragonflyBSD
pkg install pkgconf shtool libtool gcc8 automake autoconf pcre2 sqlite3 libgcrypt gmake cmocka
#### OpenBSD
pkg_add pkgconf shtool libtool gcc automake autoconf pcre2 sqlite3 openssl gmake cmocka
#### NetBSD
pkg_add pkgconf libtool gcc7 automake autoconf pcre2 sqlite3 openssl gmake cmocka
### macOS
XCode, Xcode command line tools and HomeBrew are required.
brew install autoconf automake libtool openssl shtool pkg-config hwloc pcre2 sqlite3 libpcap cmocka
### Windows
#### Cygwin
Cygwin requires the full path to the `setup.exe` utility, in order to
automate the installation of the necessary packages. In addition, it
requires the location of your installation, a path to the cached
packages download location, and a mirror URL.
An example of automatically installing all the dependencies
is as follows:
c:\cygwin\setup-x86.exe -qnNdO -R C:/cygwin -s http://cygwin.mirror.constant.com -l C:/cygwin/var/cache/setup -P autoconf -P automake -P bison -P gcc-core -P gcc-g++ -P mingw-runtime -P mingw-binutils -P mingw-gcc-core -P mingw-gcc-g++ -P mingw-pthreads -P mingw-w32api -P libtool -P make -P python -P gettext-devel -P gettext -P intltool -P libiconv -P pkg-config -P git -P wget -P curl -P libpcre2-devel -P libssl-devel -P libsqlite3-devel
#### MSYS2
pacman -Sy autoconf automake-wrapper libtool msys2-w32api-headers msys2-w32api-runtime gcc pkg-config git python openssl-devel openssl libopenssl msys2-runtime-devel gcc binutils make pcre2-devel libsqlite-devel
## Docker containers
We have two repositories on DockerHub:
- [aircrackng/release](https://hub.docker.com/r/aircrackng/release): Each release
- [aircrackng/git](https://hub.docker.com/r/aircrackng/git): every commit in the git repository
Base command for the `git` version:
`sudo docker run --rm -it aircrackng/git`
Available platforms/CPU architectures:
- linux/386 (base image: debian:unstable-slim)
- linux/amd64 (base image: debian:unstable-slim)
- linux/arm/v5 (base image: debian:unstable-slim)
- linux/arm/v6 (base image: alpine:3)
- linux/arm/v7 (base image: debian:unstable-slim)
- linux/arm64/v8 (base image: debian:unstable-slim)
- linux/mips64le (base image: debian:unstable-slim)
- linux/ppc64le (base image: debian:unstable-slim)
- linux/riscv64 (base image: debian:unstable-slim)
- linux/s390x (base image: debian:unstable-slim)
## Compiling
To build `aircrack-ng`, the Autotools build system is utilized. Autotools replaces
the older method of compilation.
**NOTE**: If utilizing a developer version, eg: one checked out from source control,
you will need to run a pre-`configure` script. The script to use is one of the
following: `autoreconf -i` or `env NOCONFIGURE=1 ./autogen.sh`.
First, `./configure` the project for building with the appropriate options specified
for your environment:
./configure <options>
**TIP**: If the above fails, please see above about developer source control versions.
Next, compile the project (respecting if `make` or `gmake` is needed):
* Compilation:
`make`
* Compilation on *BSD or Solaris:
`gmake`
Finally, the additional targets listed below may be of use in your environment:
* Execute all unit testing:
`make check`
* Execute all integration testing (requires root):
`make integration`
* Installing:
`make install`
* Uninstall:
`make uninstall`
### `./configure` flags
When configuring, the following flags can be used and combined to adjust the suite
to your choosing:
* **with-airpcap=DIR**: needed for supporting airpcap devices on Windows (Cygwin or MSYS2 only).
Replace DIR above with the absolute location to the root of the
extracted source code from the Airpcap CD or downloaded SDK available
online. Required on Windows to build `besside-ng`, `besside-ng-crawler`,
`easside-ng`, `tkiptun-ng` and `wesside-ng` when building experimental tools.
The developer pack (Compatible with version 4.1.1 and 4.1.3) can be downloaded at
https://support.riverbed.com/content/support/software/steelcentral-npm/airpcap.html
* **with-experimental**: needed to compile `tkiptun-ng`, `easside-ng`, `buddy-ng`,
`buddy-ng-crawler`, `airventriloquist` and `wesside-ng`.
libpcap development package is also required to compile most of the tools.
If not present, not all experimental tools will be built.
On Cygwin, libpcap is not present and the Airpcap SDK replaces it.
See --with-airpcap option above.
* **with-ext-scripts**: needed to build `airoscript-ng`, `versuck-ng`, `airgraph-ng` and
`airdrop-ng`.
Note: Each script has its own dependencies.
* **with-gcrypt**: Use libgcrypt crypto library instead of the default OpenSSL.
And also use internal fast sha1 implementation (borrowed from GIT).
Dependency (Debian): libgcrypt20-dev
* **with-duma**: Compile with DUMA support. DUMA is a library to detect buffer overruns and underruns.
Dependency (Debian): duma
* **disable-libnl**: Set up the project to be compiled without libnl (1 or 3). Linux option only.
* **without-opt**: Do not enable -O3 optimizations.
* **enable-shared**: Make OSdep a shared library.
* **disable-shared**: When combined with **enable-static**, it will statically compile Aircrack-ng.
* **with-avx512**: On x86, add support for AVX512 instructions in aircrack-ng. Only use it when
the current CPU supports AVX512.
* **with-static-simd=<SIMD>**: Compile a single optimization in aircrack-ng binary. Useful when compiling
statically and/or for space-constrained devices. Valid SIMD options: x86-sse2,
x86-avx, x86-avx2, x86-avx512, ppc-altivec, ppc-power8, arm-neon, arm-asimd.
Must be used with --enable-static --disable-shared. When using those 2 options, the default
is to compile the generic optimization in the binary. --with-static-simd merely allows
to choose another one.
* **enable-maintainer-mode**: It is important to enable this flag when developing with Aircrack-ng. This flag enables additional compile warnings and safety features.
#### Examples:
* Configure and compiling:
```
./configure --with-experimental
make
```
* Compiling with gcrypt:
```
./configure --with-gcrypt
make
```
* Installing:
`make install`
* Installing (strip binaries):
`make install-strip`
* Installing, with external scripts:
```
./configure --with-experimental --with-ext-scripts
make
make install
```
* Testing (with sqlite, experimental and pcre2)
```
./configure --with-experimental
make
make check
```
* Compiling on OS X with macports (and all options):
```
./configure --with-experimental
gmake
```
* Compiling on macOS running on M1/AARCH64 and Homebrew:
```
autoreconf -vif
env CPPFLAGS="-Wno-deprecated-declarations" ./configure --with-experimental
make
make check
```
* Compiling on OS X 10.10 with XCode 7.1 and Homebrew:
```
env CC=gcc-4.9 CXX=g++-4.9 ./configure
make
make check
```
*NOTE*: Older XCode ships with a version of LLVM that does not support CPU feature
detection; which causes the `./configure` to fail. To work around this older LLVM,
it is required that a different compile suite is used, such as GCC or a newer LLVM
from Homebrew.
If you wish to use OpenSSL from Homebrew, you may need to specify the location
to its installation. To figure out where OpenSSL lives, run:
`brew --prefix openssl`
Use the output above as the DIR for `--with-openssl=DIR` in the `./configure` line:
```
env CC=gcc-4.9 CXX=g++-4.9 ./configure --with-openssl=DIR
make
make check
```
* Compiling on FreeBSD with gcc9
```
env CC=gcc9 CXX=g++9 MAKE=gmake ./configure
gmake
```
* Compiling on Cygwin with Airpcap (assuming Airpcap devpack is unpacked in Aircrack-ng directory)
```
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-osdep
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-crypto
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-util
dlltool -D Airpcap_Devpack/bin/x86/airpcap.dll -d build/airpcap.dll.def -l Airpcap_Devpack/bin/x86/libairpcap.dll.a
autoreconf -i
./configure --with-experimental --with-airpcap=$(pwd)
make
```
* Compiling on DragonflyBSD with gcrypt using GCC 8
```
autoreconf -i
env CC=gcc8 CXX=g++8 MAKE=gmake ./configure --with-experimental --with-gcrypt
gmake
```
* Compiling on OpenBSD (with autoconf 2.69 and automake 1.16)
```
export AUTOCONF_VERSION=2.69
export AUTOMAKE_VERSION=1.16
autoreconf -i
env MAKE=gmake CC=cc CXX=c++ ./configure
gmake
```
* Compiling and debugging aircrack-ng
```
export CFLAGS='-O0 -g'
export CXXFLAGS='-O0 -g'
./configure --with-experimental --enable-maintainer-mode --without-opt
make
LD_LIBRARY_PATH=.libs gdb --args ./aircrack-ng [PARAMETERS]
```
# IDE development
## VS Code - devcontainers
A VS Code development environment is provided, as is, for rapid setup of a development environment. This additionally adds support for GitHub Codespaces.
### Requirements
The first requirement is a working [Docker Engine](https://docs.docker.com/engine/install/) environment.
Next, an installation of [VS Code](https://code.visualstudio.com/) with the following extension(s):
- [`Remote - Containers`](https://marketplace.visualstudio.com/items?itemName=ms-vscode-remote.remote-containers) by Microsoft.
> The "Remote - Containers" extension will refuse to work with OSS Code.
### Usage
1. Clone this repository to your working folder:
```
$ git clone --recursive https://github.com/aircrack-ng/aircrack-ng.git
$ cd aircrack-ng
```
2. After cloning this repository, open the folder inside VS Code.
```
$ code .
```
> IMPORTANT: You should answer "Yes", if it asks if the folder should be opened inside a remote container. If it does not ask, then press `Ctrl+Shift+P` and type `open in container`. This should bring up the correct command, for which pressing enter will run said command.
3. A number of warnings might appear about a missing `compile_commands.json` file. These are safe to ignore for a moment, as this file is automatically generated after the initial compilation.
4. Now build the entire project by pressing `Ctrl+R` and selecting `Build Full` from the pop-up menu that appears.
5. VS Code should detect the `compile_commands.json` file and ask if it should be used; selecting "Yes, always" will complete the initial setup of a fully working IDE.
> IMPORTANT: If it doesn't detect the file, pressing `Ctrl+Shift+P` and typing `reload window` will bring up the selection to fully reload the environment.
6. At this point, nearly all features of VS Code will function; from Intellisense, auto-completion, live documentation, to code formatting. Additionally, there are pre-configured tasks for builds and tests, as well as an example GDB/LLDB configuration for debugging `aircrack-ng`.
# Packaging
Automatic detection of CPU optimization is done at run time. This behavior
**is** desirable when packaging Aircrack-ng (for a Linux or other distribution.)
Also, in some cases it may be desired to provide your own flags completely and
not having the suite auto-detect a number of optimizations. To do this, add
the additional flag `--without-opt` to the `./configure` line:
`./configure --without-opt`
# Using pre-compiled binaries
## Linux/BSD
Aircrack-ng is available in most distributions repositories. However, it is not always up-to-date.
## Windows
* Install the appropriate "monitor" driver for your card; standard drivers don't work for capturing data.
* Aircrack-ng suite is command line tools. So, you have to open a command-line
`Start menu -> Run... -> cmd.exe` then use them
* Run the executables without any parameters to have help
# Documentation
Some more information is present in the [README](README) file.
Documentation, tutorials, ... can be found on https://aircrack-ng.org
Support is available in the [GitHub Discussions](https://github.com/aircrack-ng/aircrack-ng/discussions) and on IRC (in #aircrack-ng on Libera Chat).
Every tool has its own manpage. For aircrack-ng, `man aircrack-ng`
# Infrastructure sponsors
|
|
Explain the purpose of the module 'aircrack-ng/SECURITY.md'. Describe how it is used in security workflows. Language: Markdown.
|
# Security Policy
Although we do our best to prevent vulnerabilities, and have tools to help
catch most of them, we are humans after all, and there will be inevitably
issues slipping through the cracks.
They can fall into two categories, either in any of the tools in the
Aircrack-ng suite, or in our presence online (website, forum, emails,
DNS, etc.).
Depending on which category they fall into, different information is needed. We
do believe in coordinated disclosure, so in order to address them, and
coordinate disclosure with you (and properly credit you for the discovery),
report them to us. Do not open bug reports or pull requests.
Our contact email for security issues is security@aircrack-ng.org
If you are unsure how to proceed, need clarifications or have questions or
remarks about this policy, feel free to email us to inquire.
## Aircrack-ng suite vulnerabilities
### Supported versions
We only support the latest stable present on https://aircrack-ng.org
For security issues present in our GitHub repository (master or any recently
active branch), open a pull request or bug report.
For any security issue affecting older versions of Aircrack-ng still present
in currently supported Linux or BSD distributions, file a report with them,
and email us a short description of the vulnerability along with a link to
the bug report.
### Reporting
There is no particular template to report the vulnerabilities. Keep in mind
that a vulnerability is essentially a bug, so please provide us detailed
information on how to reproduce it, such as:
- Which Aircrack-ng tools are affected? And how? Any proof of concept to
demonstrate it?
- Operating systems involved, kernel versions (`uname -a` and
`lsb_release -a` for example).
- CPU architecture (`aircrack-ng -u` output is useful); a vulnerability on a
x86 32 bit may not be exploitable on ARM 64 bit. A bug may also only be present
when Aircrack-ng is compiled a certain way.
- All the commands needed to trigger the issue.
- Did you compile it yourself or did you get it from a package?
- What equipment did you use? A packet capture may be useful; different
equipment behaves differently, they have different Wi-Fi stacks, drivers, and
firmwares.
- A patch to fix the issue, if available.
- If CVE numbers have been assigned, please provide them as well.
### Public disclosure
Although it is essentially a bug, do not submit a bug report or a pull request,
but email us the data first, so we can coordinate fixing the issue and assist
you in filing the bug reports, and if you provided a patch, the pull request; a
patch may need to be broken down in multiple commits for clarity, for example.
## Online presence
For any security issue affecting us specifically (any aircrack-ng.org
subdomain) such as misconfiguration of our hosting, DNS, email, servers,
or misconfiguration of the software we are using, email us with all the
details regarding your findings.
Anything else should be reported to the author or provider of the software,
hardware, or hosting.
|
|
Explain the purpose of the module 'aircrack-ng/.devcontainer/devcontainer.json'. Describe how it is used in security workflows. Language: JSON.
|
// For format details, see https://aka.ms/devcontainer.json. For config options, see the README at:
// https://github.com/microsoft/vscode-dev-containers/tree/v0.154.2/containers/cpp
{
"name": "Aircrack-ng",
"build": {
"dockerfile": "Dockerfile",
// Update 'VARIANT' to pick an Debian / Ubuntu OS version: debian-10, debian-9, ubuntu-20.04, ubuntu-18.04
"args": {
"VARIANT": "ubuntu-22.04"
}
},
"runArgs": [
"--cap-add=SYS_PTRACE",
"--security-opt",
"seccomp=unconfined"
],
// Configure tool-specific properties.
"customizations": {
// Configure properties specific to VS Code.
"vscode": {
// Set *default* container specific settings.json values on container create.
"settings": {
"terminal.integrated.defaultProfile.linux": "bash",
"editor.formatOnSave": true,
"clang-format.executable": "/usr/local/bin/clang-format",
"clang-format.fallbackStyle": "none",
"clang-format.assumeFilename": "${file}",
"clang-format.style": "file",
"editor.defaultFormatter": "llvm-vs-code-extensions.vscode-clangd",
"clangd.path": "/usr/bin/clangd-14",
"C_Cpp.clang_format_fallbackStyle": "none",
"C_Cpp.clang_format_path": "/usr/local/bin/clang-format",
"C_Cpp.clang_format_style": "file",
"C_Cpp.formatting": "clangFormat"
},
// Add the IDs of extensions you want installed when the container is created.
"extensions": [
"ms-vscode.cpptools",
"xaver.clang-format",
"llvm-vs-code-extensions.vscode-clangd"
]
}
},
// Use 'forwardPorts' to make a list of ports inside the container available locally.
// "forwardPorts": [],
// Use 'postCreateCommand' to run commands after the container is created.
"postCreateCommand": "pre-commit install --install-hooks",
// Comment out to connect as root instead. More info: https://aka.ms/vscode-remote/containers/non-root.
"remoteUser": "vscode"
}
|
|
Explain the purpose of the module 'aircrack-ng/.devcontainer/Dockerfile'. Describe how it is used in security workflows. Language: unknown.
|
# See here for image contents: https://github.com/microsoft/vscode-dev-containers/tree/v0.154.2/containers/cpp/.devcontainer/base.Dockerfile
# [Choice] Debian / Ubuntu version: debian-10, debian-9, ubuntu-20.04, ubuntu-18.04
ARG VARIANT
FROM mcr.microsoft.com/vscode/devcontainers/cpp:0-${VARIANT}
# hadolint ignore=DL3003,DL3008
RUN apt-get update \
&& export DEBIAN_FRONTEND=noninteractive \
&& apt-get -y install --no-install-recommends \
build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev \
ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre2-dev libhwloc-dev \
libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils expect gawk bear \
libtinfo5 \
clangd-14 \
clang-format-14 \
python3-pip \
&& rm -rf /var/lib/apt/lists/* \
&& /usr/bin/pip3 install pre-commit
|
|
Explain the purpose of the module 'aircrack-ng/.github/ISSUE_TEMPLATE/bug_report.md'. Describe how it is used in security workflows. Language: Markdown.
|
---
name: Bug report
about: Used to report a defect in the source code, scripts, website, documentation, etc... Post questions
in the GitHub Discussions tab - Read our
documentation at https://aircrack-ng.org
---
<!--
**Bug reports will only be accepted against the current tip of the master git branch. Anything else will be rejected. Questions must be posted in the discussion board at <https://github.com/aircrack-ng/aircrack-ng/discussions>.**
For any security-related issues such as exploits, buffer overflows, and such, refer to our security policy: <https://github.com/aircrack-ng/aircrack-ng/security/policy>
Please read the following before reporting the issue:
- Use the search function to check if the bug you're about to post isn't a duplicate. If an existing bug is open and you have new information, update it. If a bug exists and is closed, reopen it and add useful information to it.
- Unless bugs are linked, one bug per ticket.
- Don't worry about any of the items on the right panel (Assignee, Labels or Milestone), we will take care of them.
The following must be taken to the GitHub Discussions first, as in these cases, it often turns out to be a technique issue or the issue is out of our control:
- Not receiving any packets with airodump-ng or any other tool.
- Can't crack a network.
- Wireless card doesn't work.
- Channel -1.
Make sure to check our documentation at <https://aircrack-ng.org/doku.php> as well as our fairly comprehensive FAQ at <https://aircrack-ng.org/doku.php?id=faq>.
**REMOVE ALL OF THE ABOVE TEXT**
-->
# Defect Report
## Issue type
<!--
Please select from one of the following software defect descriptions. Pick the one(s) that best reflects the issue you are experiencing. Erase the others.
-->
- [ ] Defect - Compilation or `make check` issue - Attach `config.log` and provide relevant system information such as `lscpu` - Make sure dependencies are installed
- [ ] Defect - Crash
- [ ] Defect - Incorrect value displayed/received/stored
- [ ] Defect - Unexpected behavior (obvious or confirmed in the GitHub Discussions)
## System information
<!--
On Linux, OS version can often be found in /etc/os-release. On Debian-based you may use `lsb_release -i` for "OS Name", `lsb_release -r` for "OS version".
Copy and paste the output of `uname -a` in Kernel version.
CPU information can be gathered with `lscpu`, or `cat /proc/cpuinfo`
Wireless card and chipset information is displayed with `airmon-ng`. If it doesn't display anything, add information from `lspci`, `lsusb`, and `sudo lshw -c network -sanitize`. The wireless adapter can also be found in dmesg.
-->
- OS Name:
- OS Version:
- Kernel version:
- CPU:
- Wireless card and chipset (if relevant):
## Aircrack-ng version
<!--
For the aircrack-ng version, run `aircrack-ng | head`, it will be displayed right after 'Aircrack-ng'.
When compiled from git, the short SHAsum (7 characters long) will be shown right after the version number.
Don't say 'Latest' for the version, this is not helpful as it changes over time.
-->
- Version:
- Commit Revision hash:
## Airmon-ng debug information
<!--
If the issue is related to packet capture or injection, run `airmon-ng --debug` and post the output here.
Please make sure to enclose with backticks for readability.
-->
## Defect
### Details
<!--
Summarize the issue in a paragraph or two.
If you need to provide output of the different tools, or commands, file content, etc, use the backticks to enclose the text.
Only post pictures if the issues when it cannot be avoided.
-->
### How to reproduce the issue
<!--
A clear and concise list of steps describing how to reproduce the issue, relevant commands and errors/outputs. Such as: What command(s) did you run? What was displayed/happened? What did you expect to happen or be displayed?
Do not use pastebin-type links as they expire, rendering the bug report unactionable. Avoid using images whenever possible. If the content (output or error) is text and can be copy/pasted, enclose it with backticks for readability. If it is large, put it in a file and attach it to the ticket.
GitHub markdown guide: https://guides.github.com/features/mastering-markdown/
Last, but not least, if you aren't familiar with bug reporting, [this](https://www.chiark.greenend.org.uk/~sgtatham/bugs.html) is an excellent read to help you describe bugs accurately.
-->
## Related issues
<!--
Link to any related issue from within the project or outside. Such as GitHub, other bug trackers, relevant GitHub Discussion post, relevant documentation.
-->
|
|
Explain the purpose of the module 'aircrack-ng/.github/ISSUE_TEMPLATE/config.yml'. Describe how it is used in security workflows. Language: YAML.
|
blank_issues_enabled: false
contact_links:
- name: Website
url: https://aircrack-ng.org
- name: Support
url: https://github.com/aircrack-ng/aircrack-ng/discussions
about: We provide support in Discussion section.
- name: Documentation
url: https://aircrack-ng.org/doku.php
about: Comprehensive documentation (for each tool, as well as tutorials, and other resources)
- name: Frequently Asked Questions
url: https://aircrack-ng.org/doku.php?id=faq
- name: GitHub Markdown guide
url: https://guides.github.com/features/mastering-markdown/
about: Proper formatting is important to distinguish the explanation in the bug report from the commands and their output
- name: How to Report Bugs Effectively
url: https://www.chiark.greenend.org.uk/~sgtatham/bugs.html
about: By Simon Tatham
|
|
Explain the purpose of the module 'aircrack-ng/.github/ISSUE_TEMPLATE/feature_request.md'. Describe how it is used in security workflows. Language: Markdown.
|
---
name: Feature request
about: Suggest an idea for this project
---
Please read the following:
- Always test with current git master before opening a feature request
- Use the search function to see if the feature you're about to request isn't a duplicate. If an existing issue is open and you have new information, update it
- One feature/topic request per ticket
- Don't worry about any of the items on the right panel (Assignee, Labels or Milestone), we will take care of them
**REMOVE ALL OF THE ABOVE TEXT**
# Description
Describe the feature/topic. Even though the following is more geared toward bug reporting, it is an excellent read to provide useful details: https://www.chiark.greenend.org.uk/~sgtatham/bugs.html
If output/file content is relevant, add an example enclosed in backticks.
GitHub markdown guide: https://guides.github.com/features/mastering-markdown/
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/almalinux.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: Alma Linux CI
on:
push:
branches:
- 'master'
paths-ignore:
- '.devcontainer/**'
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/alpine.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/dragonflybsd.yml'
- '.github/workflows/freebsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/kali.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- 'apparmor/**'
- 'contrib/**'
- 'manpages/**'
- 'patches/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AUTHORS'
- 'ChangeLog'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'centos_autotools.sh'
- 'scripts/airmon-ng.freebsd'
pull_request:
branches: [ master ]
paths-ignore:
- '.devcontainer/**'
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/alpine.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/dragonflybsd.yml'
- '.github/workflows/freebsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- 'apparmor/**'
- 'contrib/**'
- 'manpages/**'
- 'patches/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AUTHORS'
- 'ChangeLog'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'centos_autotools.sh'
- 'scripts/airmon-ng.freebsd'
jobs:
lint:
runs-on: ubuntu-22.04
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Lint Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: Dockerfile
verbose: true
failure-threshold: error
-
name: Lint Release Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: './Dockerfile.release'
verbose: true
failure-threshold: error
-
name: Shellcheck package install script
uses: sudo-bot/action-shellcheck@latest
with:
cli-args: "docker_package_install.sh"
alma:
runs-on: ubuntu-22.04
needs: lint
steps:
-
name: Set up QEMU
uses: docker/setup-qemu-action@v2
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
-
name: Build on linux/amd64
uses: docker/build-push-action@v3
with:
platforms: linux/amd64
build-args: IMAGE_BASE=almalinux:9
push: false
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/alpine.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: Alpine Linux CI
on:
push:
branches:
- 'master'
paths-ignore:
- '.devcontainer/**'
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/almalinux.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/dragonflybsd.yml'
- '.github/workflows/freebsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/kali.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- 'apparmor/**'
- 'contrib/**'
- 'manpages/**'
- 'patches/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AUTHORS'
- 'ChangeLog'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'centos_autotools.sh'
- 'scripts/airmon-ng.freebsd'
pull_request:
branches:
- 'master'
paths-ignore:
- '.devcontainer/**'
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/almalinux.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/dragonflybsd.yml'
- '.github/workflows/freebsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/kali.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- 'apparmor/**'
- 'contrib/**'
- 'manpages/**'
- 'patches/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AUTHORS'
- 'ChangeLog'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'centos_autotools.sh'
- 'scripts/airmon-ng.freebsd'
jobs:
lint:
runs-on: ubuntu-22.04
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Lint Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: Dockerfile
verbose: true
failure-threshold: error
-
name: Lint Release Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: './Dockerfile.release'
verbose: true
failure-threshold: error
-
name: Shellcheck package install script
uses: sudo-bot/action-shellcheck@latest
with:
cli-args: "docker_package_install.sh"
alpine:
runs-on: ubuntu-22.04
needs: lint
steps:
-
name: Set up QEMU
uses: docker/setup-qemu-action@v2
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
-
name: Build on linux/amd64 and linux/386
uses: docker/build-push-action@v3
with:
platforms: linux/amd64, linux/386
build-args: IMAGE_BASE=alpine:3
push: false
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/check-release-ready.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: Release readiness
on:
push:
branches: [ master ]
paths:
- '.github/workflows/check-release-ready.yml'
pull_request:
branches: [ master ]
paths:
- '.github/workflows/check-release-ready.yml'
workflow_dispatch:
jobs:
release-ready:
runs-on: ubuntu-22.04
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Get last git tag
id: git
run: |
CUR_TAG=$(git ls-remote --tags https://github.com/aircrack-ng/aircrack-ng | awk -F/ '{print $3}' | grep -E '^[0-9]\.' | sort -V | tail -n 1)
echo "LAST=${CUR_TAG}" >> $GITHUB_OUTPUT
echo "Tag: ${CUR_TAG} - Date: ${TAG_DATE}"
-
name: Get Changelog information
id: changelog
run: |
LAST_VER=$(head -n 1 ChangeLog | awk '{print $2}')
echo "LAST_VER=${LAST_VER}" >> $GITHUB_OUTPUT
CHANGES_FROM=$(head -n 1 ChangeLog | awk '{print $6}' | awk -F\) '{print $1}')
echo "CHANGES_FROM=${CHANGES_FROM}" >> $GITHUB_OUTPUT
REL_DATE=$(head -n 1 ChangeLog | awk '{print $9 " " $10 " " $11}' | sed 's/.$//')
echo "REL_DATE=${REL_DATE}" >> $GITHUB_OUTPUT
ENTRIES=0
[ -n "$(head -n 2 ChangeLog | tail -n 1 | grep -E '^* ')" ] && ENTRIES=1
echo "ENTRIES=${ENTRIES}" >> $GITHUB_OUTPUT
echo "Last: ${LAST_VER} - From: ${CHANGES_FROM} - Date: ${REL_DATE} - Entries present:${ENTRIES}"
- name: Get info from configure
id: configure
run: |
VERSION_MAJOR=$(grep 'm4_define(\[version_major\],' configure.ac | awk '{print $2}' | awk -F\) '{print $1}')
VERSION_MINOR=$(grep 'm4_define(\[version_minor\],' configure.ac | awk '{print $2}' | awk -F\) '{print $1}')
VERSION_MICRO=$(grep 'm4_define(\[version_micro\],' configure.ac | awk '{print $2}' | awk -F\) '{print $1}')
if [ "${VERSION_MICRO}" -gt 0 ]; then
echo "VERSION=${VERSION_MAJOR}.${VERSION_MINOR}.${VERSION_MICRO}" >> $GITHUB_OUTPUT
else
echo "VERSION=${VERSION_MAJOR}.${VERSION_MINOR}" >> $GITHUB_OUTPUT
fi
VERSION_DATE=$(grep 'm4_define(\[version_date\],' configure.ac | awk -F\" '{print $2}')
echo "VERSION_DATE=${VERSION_DATE}" >> $GITHUB_OUTPUT
echo "Version: ${VERSION_MAJOR}.${VERSION_MINOR}.${VERSION_MICRO} - Date: ${VERSION_DATE}"
-
name: Get copyright dates in some tools
id: copyright
run: |
set -e
for tool in airodump-ng aircrack-ng airbase-ng aireplay-ng; do
echo "Checking ${tool}"
LICENSE=$(grep Copyright src/${tool}/${tool}.c | grep $(date +%Y) || true)
HELP=$(grep ' - (C) ' src/${tool}/${tool}.c | grep $(date +%Y) || true)
if [ -z "${LICENSE}" ] || [ -z "${HELP}" ]; then
echo "${tool}=0" >> $GITHUB_OUTPUT
else
echo "${tool}=1" >> $GITHUB_OUTPUT
fi
echo "- ${tool}: ${LICENSE} --- ${HELP}"
done
set +e
-
name: Check for iw update
id: iw
run: |
IW_URL=$(grep -E '^IW_SOURCE=' scripts/airmon-ng.linux | awk -F\" '{print $2}' | xargs dirname)
wget ${IW_URL} -O index.html
CUR_IW=$(grep '<a href="iw' index.html | grep 'xz' | awk -F\" '{print $2}' | sort -V | tail -n 1)
AIRMON_IW=$(echo ${IW_URL} | xargs basename)
if [ "${CUR_IW}" = "${AIRMON_IW}" ]; then
echo "update=0" >> $GITHUB_OUTPUT
else
echo "update=1" >> $GITHUB_OUTPUT
fi
rm -f index.html
-
name: Check for hostapd updates
id: hostapd
run: |
wget https://w1.fi/hostapd/
LATEST_HOSTAPD=$(grep '.tar.gz' index.html | awk -F\" '{print $2}' | xargs basename)
README_HOSTAPD=$(grep -E '^tar' patches/wpe/hostapd-wpe/README.md | awk '{print $3}' | sed 's/\r//')
FILE_HOSTAPD=$(ls -1 patches/wpe/hostapd-wpe/ | grep hostapd)
FILE_HOSTAPD=${FILE_HOSTAPD%-wpe.patch}
if [ "${LATEST_HOSTAPD}" = "${README_HOSTAPD}" ]; then
echo "readme=0" >> $GITHUB_OUTPUT
else
echo "readme=1" >> $GITHUB_OUTPUT
fi
if [ "${LATEST_HOSTAPD}" = "${FILE_HOSTAPD}.tar.gz" ]; then
echo "file=0" >> $GITHUB_OUTPUT
else
echo "file=1" >> $GITHUB_OUTPUT
fi
rm -f index.html
-
name: Check for freeradius updates
id: freeradius
run: |
wget https://github.com/FreeRADIUS/freeradius-server/releases.atom
LATEST=$(grep '<title>' releases.atom | grep -v Release | sort -V | tail -n 1 | awk -F\> '{print $2}' | awk -F\< '{print $1}')
# freeradius-server-${VERSION}-wpe.diff
FR_FILENAME=$(ls -1 patches/wpe/freeradius-wpe/ | grep freeradius)
README=$(grep -i 'updated patch' patches/wpe/freeradius-wpe/README.md | awk '{print $5}')
if [ "freeradius-server-${LATEST}-wpe.diff" = "${FR_FILENAME}" ]; then
echo "file=0" >> $GITHUB_OUTPUT
else
echo "file=1" >> $GITHUB_OUTPUT
fi
if [ "${LATEST}" = "${README}" ]; then
echo "readme=0" >> $GITHUB_OUTPUT
else
echo "readme=1" >> $GITHUB_OUTPUT
fi
rm releases.atom
-
name: Check all the things
run: |
DO_FAIL=0
if [ "${{steps.changelog.outputs.LAST_VER}}" = "${{steps.git.outputs.LAST}}" ]; then
echo "[!] Changelog: missing new version"
DO_FAIL=1
fi
if [ "${{steps.changelog.outputs.CHANGES_FROM}}" != "${{steps.git.outputs.LAST}}" ]; then
echo "[!] Changelog: Invalid 'changes from' version"
DO_FAIL=1
fi
if [ "${{steps.changelog.outputs.ENTRIES}}" -eq 0 ]; then
echo '[!] Changelog: Missing entries'
DO_FAIL=1
fi
date --date="${{steps.changelog.outputs.REL_DATE}}" >/dev/null 2>&1
if [ $? -ne 0 ]; then
echo "[!] Changelog: Invalid release date"
DO_FAIL=1
fi
date --date="1 ${{steps.configure.outputs.VERSION_DATE}}" >/dev/null 2>&1
if [ $? -ne 0 ]; then
echo "[!] Configure: Invalid release date"
DO_FAIL=1
fi
if [ "${{steps.configure.outputs.VERSION }}" = "${{steps.git.outputs.LAST}}" ]; then
echo "[!] Version and date in configure.ac must be updated"
DO_FAIL=1
fi
if [ "${{steps.copyright.outputs.airodump-ng }}" -eq 0 ]; then
echo "[!] Missing copyrights in airodump-ng license/help screen"
DO_FAIL=1
fi
if [ "${{steps.copyright.outputs.aircrack-ng }}" -eq 0 ]; then
echo "[!] Missing copyrights in aircrack-ng license/help screen"
DO_FAIL=1
fi
if [ "${{steps.copyright.outputs.airbase-ng }}" -eq 0 ]; then
echo "[!] Missing copyrights in airbase-ng license/help screen"
DO_FAIL=1
fi
if [ "${{steps.copyright.outputs.aireplay-ng }}" -eq 0 ]; then
echo "[!] Missing copyrights in aireplay-ng license/help screen"
DO_FAIL=1
fi
if [ "${{steps.iw.outputs.update }}" -eq 1 ]; then
echo "[!] Airmon-ng: An updated version of iw is available"
DO_FAIL=1
fi
if [ "${{steps.hostapd.outputs.readme}}" = '1' ]; then
echo "[!] Hostapd-WPE: README.md needs an update"
DO_FAIL=1
fi
if [ "${{steps.hostapd.outputs.file}}" = '1' ]; then
echo "[!] Hostapd-WPE: patch needs an update"
DO_FAIL=1
fi
if [ "${{steps.freeradius.outputs.readme}}" = '1' ]; then
echo "[!] Freeradius-WPE: README.md needs an update"
DO_FAIL=1
fi
if [ "${{steps.freeradius.outputs.file}}" = '1' ]; then
echo "[!] Freeradius-WPE: patch needs an update"
DO_FAIL=1
fi
[ ${DO_FAIL} -eq 1 ] && exit 1
build-other-linux:
needs: release-ready
uses: ./.github/workflows/manual.yml
build-gentoo:
needs: release-ready
uses: ./.github/workflows/gentoo.yml
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/codespell.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: Codespell
on:
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
push:
branches: [ master ]
pull_request:
branches: [ master ]
jobs:
codespell:
name: Codespell spell checker
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
with:
submodules: 'recursive'
- name: Install dependencies
run: sudo apt update -y && sudo apt install -y codespell
- name: Run codespell
run: codespell
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/coverity.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: Coverity Scan
on:
workflow_dispatch:
schedule:
- cron: "0 */12 * * *"
jobs:
coverity:
runs-on: ubuntu-22.04
steps:
-
name: Git Checkout
uses: actions/checkout@v3
with:
fetch-depth: 0
-
name: Compare revision on Coverity Scan and git
id: compare
run: |
wget https://scan.coverity.com/projects/aircrack-ng
COV_REV=$(grep '<p>Version:' aircrack-ng | awk '{print $2}' | cut -b 1-30)
echo "Coverity revision: ${COV_REV}"
[ -z "${COV_REV}" ] && exit 1
CUR_REV=$(git rev-parse HEAD | cut -b 1-30)
echo "Current git revision: ${CUR_REV}"
SKIP=false
if [ ${COV_REV} == ${CUR_REV} ] ||
[ -z "$(git diff --name-only ${COV_REV}..HEAD -- . | grep -v -f .coverityignore | grep -v coverityignore)" ]; then
SKIP=true
fi
echo "skip=${SKIP}" >> $GITHUB_OUTPUT
-
name: Prepare build
if: steps.compare.outputs.skip == 'false'
run: |
autoreconf -vif
./configure --with-experimental --enable-maintainer-mode
make clean
-
name: Build and upload to Coverity Scan
uses: vapier/coverity-scan-action@v1
if: steps.compare.outputs.skip == 'false'
with:
project: Aircrack-ng
command: make check
email: ${{ secrets.COVERITY_SCAN_EMAIL }}
token: ${{ secrets.COVERITY_SCAN_TOKEN }}
version: ${{ github.sha }}
description: "Git revision: ${{ github.sha }}"
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/docker-release.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: Docker build on release
on:
push:
tags:
- '*'
jobs:
docker-release:
runs-on: ubuntu-latest
strategy:
fail-fast: false
matrix:
platform: [ linux/386, linux/amd64, linux/arm/v5, linux/arm/v7, linux/arm64/v8, linux/mips64le, linux/ppc64le, linux/riscv64, linux/s390x ]
steps:
-
name: Checkout
uses: actions/checkout@v3
-
name: Set up QEMU
uses: docker/setup-qemu-action@v2
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
-
name: Login to Docker Hub
uses: docker/login-action@v2
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
-
name: Build and push
uses: docker/build-push-action@v3
with:
platforms: ${{ matrix.platform }}
build-args: GITHUB_REF_NAME
file: Dockerfile.release
push: true
tags: |
aircrackng/release:${{ github.ref_name }}
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/docker.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: Docker (git) push to DockerHub
on:
push:
branches:
- 'master'
paths-ignore:
- '.devcontainer/**'
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/almalinux.yml'
- '.github/workflows/alpine.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/dragonflybsd.yml'
- '.github/workflows/freebsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- 'apparmor/**'
- 'contrib/**'
- 'patches/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AUTHORS'
- 'ChangeLog'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'centos_autotools.sh'
- 'scripts/airmon-ng.freebsd'
workflow_dispatch:
jobs:
lint:
runs-on: ubuntu-22.04
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Lint Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: Dockerfile
verbose: true
failure-threshold: error
-
name: Lint Release Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: './Dockerfile.release'
verbose: true
failure-threshold: error
-
name: Shellcheck package install script
uses: sudo-bot/action-shellcheck@latest
with:
cli-args: "docker_package_install.sh"
x86:
runs-on: ubuntu-22.04
needs: lint
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Shorten git revision
uses: rlespinasse/shortify-git-revision@v1
with:
name: GITHUB_SHA
-
name: Set up QEMU
uses: docker/setup-qemu-action@v2
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
-
name: Login to Docker Hub
if: github.event_name != 'pull_request'
uses: docker/login-action@v2
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
-
name: Build and push on linux/amd64
uses: docker/build-push-action@v3
#continue-on-error: true
with:
platforms: linux/amd64
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
-
name: Build and push on linux/386
uses: docker/build-push-action@v3
continue-on-error: true
with:
platforms: linux/386
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
armv5-6:
runs-on: ubuntu-22.04
needs: lint
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Shorten git revision
uses: rlespinasse/shortify-git-revision@v1
with:
name: GITHUB_SHA
-
name: Set up QEMU
uses: docker/setup-qemu-action@v2
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
-
name: Login to Docker Hub
if: github.event_name != 'pull_request'
uses: docker/login-action@v2
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
-
name: Build and push on linux/arm/v5
uses: docker/build-push-action@v3
continue-on-error: true
with:
platforms: linux/arm/v5
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
-
name: Build and push on linux/arm/v6
uses: docker/build-push-action@v3
continue-on-error: true
with:
platforms: linux/arm/v6
build-args: IMAGE_BASE=alpine:3
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
arm:
runs-on: ubuntu-22.04
needs: lint
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Shorten git revision
uses: rlespinasse/shortify-git-revision@v1
with:
name: GITHUB_SHA
-
name: Set up QEMU
uses: docker/setup-qemu-action@v2
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
-
name: Login to Docker Hub
if: github.event_name != 'pull_request'
uses: docker/login-action@v2
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
-
name: Build and push on linux/arm/v7
uses: docker/build-push-action@v3
continue-on-error: true
with:
platforms: linux/arm/v7
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
-
name: Build and push on linux/arm64/v8
uses: docker/build-push-action@v3
continue-on-error: true
with:
platforms: linux/arm64/v8
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
others:
runs-on: ubuntu-22.04
needs: lint
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Shorten git revision
uses: rlespinasse/shortify-git-revision@v1
with:
name: GITHUB_SHA
-
name: Set up QEMU
uses: docker/setup-qemu-action@v2
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
-
name: Login to Docker Hub
if: github.event_name != 'pull_request'
uses: docker/login-action@v2
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
-
name: Build and push on linux/mips64le
uses: docker/build-push-action@v3
continue-on-error: true
with:
platforms: linux/mips64le
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
-
name: Build and push on linux/ppc64le
uses: docker/build-push-action@v3
continue-on-error: true
with:
platforms: linux/ppc64le
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
-
name: Build and push on linux/riscv64
uses: docker/build-push-action@v3
continue-on-error: true
with:
platforms: linux/riscv64
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
-
name: Build and push on linux/s390x
uses: docker/build-push-action@v3
continue-on-error: true
with:
platforms: linux/s390x
push: ${{ github.event_name != 'pull_request' }}
tags: |
aircrackng/git:latest
aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/dragonflybsd.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: DragonFlyBSD CI
on:
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
push:
branches: [ master ]
paths-ignore:
- apparmor/**
- contrib/**
- manpages/**
- patches/**
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/almalinux.yml'
- '.github/workflows/alpine.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/freebsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/kali.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AC_VERSION.in'
- 'AUTHORS'
- 'centos_autotools.sh'
- 'ChangeLog'
- 'docker_package_install.sh'
- 'Dockerfile'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'scripts/airmon-ng.linux'
pull_request:
branches: [ master ]
paths-ignore:
- apparmor/**
- contrib/**
- manpages/**
- patches/**
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/almalinux.yml'
- '.github/workflows/alpine.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/freebsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/kali.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AC_VERSION.in'
- 'AUTHORS'
- 'centos_autotools.sh'
- 'ChangeLog'
- 'docker_package_install.sh'
- 'Dockerfile'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'scripts/airmon-ng.linux'
env:
LANG: en_US.UTF-8
TZ: UTC
MAKE: gmake
jobs:
dragonflybsd:
runs-on: macos-12
strategy:
fail-fast: false
matrix:
compiler:
- cc: gcc
cxx: g++
flags:
- name: OpenSSL
flags: ""
name: DragonFlyBSD ${{ matrix.compiler.cc }} using ${{ matrix.flags.name }}
steps:
- uses: actions/checkout@v3
with:
fetch-depth: 750
submodules: 'recursive'
- name: Build with ${{ matrix.compiler.cc }} using ${{ matrix.flags.name }}
id: build
uses: vmactions/dragonflybsd-vm@v0
with:
envs: 'LANG TZ MAKE'
usesh: true
sync: rsync
copyback: false
prepare: |
pkg install -y git pkgconf shtool libtool ${{ matrix.compiler.cc }} automake autoconf pcre2 sqlite3 gmake cmocka
run: |
export CC="${{ matrix.compiler.cc }}"
export CXX="${{ matrix.compiler.cxx }}"
alias nproc='sysctl -n hw.ncpu'
CPUS=$(nproc)
git config --global --add safe.directory /Users/runner/work/aircrack-ng/aircrack-ng
echo "::group::make distclean"
make distclean || :
echo "::endgroup::"
echo "::group::autoreconf"
autoreconf -vif
echo "::endgroup::"
echo "::group::configure"
echo ">> Configure with $CC, $CXX, and ${{ matrix.flags.flags }}"
./configure --enable-maintainer-mode --with-experimental --without-opt || { cat config.log; exit 1; }
echo "::endgroup::"
echo "::group::build"
echo ">> Build using ${CPUS} jobs"
gmake -j ${CPUS}
echo "::endgroup::"
echo "::group::run tests"
gmake -j ${CPUS} check || { find . -name 'test-suite.log' -exec cat {} ';' && exit 1; }
echo "::endgroup::"
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/freebsd.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: FreeBSD CI
on:
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
push:
branches: [ master ]
paths-ignore:
- apparmor/**
- contrib/**
- manpages/**
- patches/**
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/almalinux.yml'
- '.github/workflows/alpine.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/dragonflybsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/kali.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AC_VERSION.in'
- 'AUTHORS'
- 'centos_autotools.sh'
- 'ChangeLog'
- 'docker_package_install.sh'
- 'Dockerfile'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'scripts/airmon-ng.linux'
pull_request:
branches: [ master ]
paths-ignore:
- apparmor/**
- contrib/**
- manpages/**
- patches/**
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/almalinux.yml'
- '.github/workflows/alpine.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/dragonflybsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/kali.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AC_VERSION.in'
- 'AUTHORS'
- 'centos_autotools.sh'
- 'ChangeLog'
- 'docker_package_install.sh'
- 'Dockerfile'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'scripts/airmon-ng.linux'
env:
LANG: en_US.UTF-8
TZ: UTC
MAKE: gmake
jobs:
freebsd:
runs-on: macos-12
strategy:
fail-fast: false
matrix:
compiler:
- cc: gcc
cxx: g++
flags:
- name: OpenSSL
flags: ""
name: FreeBSD ${{ matrix.compiler.cc }} using ${{ matrix.flags.name }}
steps:
- uses: actions/checkout@v3
with:
fetch-depth: 750
submodules: 'recursive'
- name: Build with ${{ matrix.compiler.cc }} using ${{ matrix.flags.name }}
id: build
uses: vmactions/freebsd-vm@v0
with:
envs: 'LANG TZ MAKE'
usesh: true
sync: rsync
copyback: false
prepare: |
pkg install -y git pkgconf shtool libtool gcc automake autoconf pcre2 sqlite3 openssl gmake hwloc cmocka
run: |
export CC="${{ matrix.compiler.cc }}"
export CXX="${{ matrix.compiler.cxx }}"
alias nproc='sysctl -n hw.ncpu'
CPUS=$(nproc)
git config --global --add safe.directory /Users/runner/work/aircrack-ng/aircrack-ng
echo "::group::make distclean"
make distclean || :
echo "::endgroup::"
echo "::group::autoreconf"
autoreconf -vif
echo "::endgroup::"
echo "::group::configure"
echo ">> Configure with $CC, $CXX, and ${{ matrix.flags.flags }}"
./configure --enable-maintainer-mode --with-experimental --without-opt || { cat config.log; exit 1; }
echo "::endgroup::"
echo "::group::build"
echo ">> Build using ${CPUS} jobs"
gmake -j ${CPUS}
echo "::endgroup::"
echo "::group::run tests"
gmake -j ${CPUS} check || { find . -name 'test-suite.log' -exec cat {} ';' && exit 1; }
echo "::endgroup::"
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/gentoo.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: Gentoo CI
on:
push:
branches: [ master ]
paths:
- '.github/workflows/gentoo.yml'
pull_request:
branches: [ master ]
paths:
- '.github/workflows/gentoo.yml'
workflow_call:
workflow_dispatch:
jobs:
gentoo:
runs-on: ubuntu-22.04
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Lint Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: Dockerfile
verbose: true
failure-threshold: error
-
name: Lint Release Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: './Dockerfile.release'
verbose: true
failure-threshold: error
-
name: Shellcheck package install script
uses: sudo-bot/action-shellcheck@latest
with:
cli-args: "docker_package_install.sh"
-
name: Set up QEMU
uses: docker/setup-qemu-action@v2
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
-
name: Build on linux/amd64
uses: docker/build-push-action@v3
with:
platforms: linux/amd64
build-args: "IMAGE_BASE=gentoo/stage3"
push: false
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/irc.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: IRC notifications
on: [push, pull_request, create, issues]
jobs:
notification:
runs-on: ubuntu-22.04
name: IRC Notification
steps:
- name: Skip if not aircrack-ng/aircrack-ng
run: |
if [ "${{ github.repository }}" != 'aircrack-ng/aircrack-ng' ]; then
exit 1
fi
# If 2 consecutive calls happen, the second one can fail as
# it's not able to get the username requested
- name: Generate random username
id: random
run: |
USERNAME=$(mktemp -u | awk -F. '{print "gh-a-ng-" $2}')
echo "username=${USERNAME}" >> $GITHUB_OUTPUT
- name: Commit
uses: Gottox/irc-message-action@v2.1.3
if: github.event_name == 'push'
with:
channel: '#aircrack-ng'
nickname: ${{steps.random.outputs.username}}
message: |-
Commit by ${{ github.actor }}: ${{ github.event.compare }}
${{ join(github.event.commits.*.message) }}
- name: Pull Request Created
uses: Gottox/irc-message-action@v2.1.3
if: github.event_name == 'pull_request'
with:
channel: '#aircrack-ng'
nickname: ${{steps.random.outputs.username}}
message: |-
New pull request #${{ github.event.number }} by ${{ github.actor }}: ${{ github.event.pull_request.title }} - ${{ github.event.pull_request.html_url }}
- name: Issue created
uses: Gottox/irc-message-action@v2.1.3
if: github.event_name == 'issues' && github.event.action == 'opened' && github.event.issue.draft == false
with:
channel: '#aircrack-ng'
nickname: ${{steps.random.outputs.username}}
message: |-
New issue #${{github.event.issue.number}} (${{github.event.issue.url}}) by ${{ github.actor }}: ${{github.event.issue.title}} ()
- name: New tag/release
uses: Gottox/irc-message-action@v2.1.3
if: github.event_name == 'create' && github.event.ref_type == 'tag'
with:
channel: '#aircrack-ng'
nickname: ${{steps.random.outputs.username}}
message: |-
New release in GitHub: ${{ github.event.ref }}
|
|
Explain the purpose of the module 'aircrack-ng/.github/workflows/kali.yml'. Describe how it is used in security workflows. Language: YAML.
|
name: Kali Linux CI
on:
push:
branches:
- 'master'
paths-ignore:
- '.devcontainer/**'
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/almalinux.yml'
- '.github/workflows/alpine.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/dragonflybsd.yml'
- '.github/workflows/freebsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- 'apparmor/**'
- 'contrib/**'
- 'manpages/**'
- 'patches/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AUTHORS'
- 'ChangeLog'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'centos_autotools.sh'
- 'scripts/airmon-ng.freebsd'
pull_request:
branches: [ master ]
paths-ignore:
- '.devcontainer/**'
- '.coverityignore'
- '.github/workflows/gentoo.yml'
- '.github/ISSUE_TEMPLATE/**'
- '.github/workflows/almalinux.yml'
- '.github/workflows/alpine.yml'
- '.github/workflows/check-release-ready.yml'
- '.github/workflows/codespell.yml'
- '.github/workflows/coverity.yml'
- '.github/workflows/docker.yml'
- '.github/workflows/docker-release.yml'
- '.github/workflows/dragonflybsd.yml'
- '.github/workflows/freebsd.yml'
- '.github/workflows/irc.yml'
- '.github/workflows/linux.yml'
- '.github/workflows/linux-pcre.yml'
- '.github/workflows/macos.yml'
- '.github/workflows/manual.yml'
- '.github/workflows/markdown-link.yml'
- '.github/workflows/netbsd.yml'
- '.github/workflows/openbsd.yml'
- '.github/workflows/pvs-studio.yml'
- '.github/workflows/scanbuild.yml'
- '.github/workflows/style.yml'
- '.github/workflows/windows.yml'
- '.vscode/**'
- 'apparmor/**'
- 'contrib/**'
- 'manpages/**'
- 'patches/**'
- '.clang-format'
- '.editorconfig'
- '.gitignore'
- '.pre-commit-config.yaml'
- 'AUTHORS'
- 'ChangeLog'
- 'Dockerfile.release'
- 'INSTALLING'
- 'LICENSE'
- 'LICENSE.OpenSSL'
- 'README'
- 'README.md'
- 'SECURITY.md'
- 'centos_autotools.sh'
- 'scripts/airmon-ng.freebsd'
jobs:
lint:
runs-on: ubuntu-22.04
steps:
-
name: Git Checkout
uses: actions/checkout@v3
-
name: Lint Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: Dockerfile
verbose: true
failure-threshold: error
-
name: Lint Release Dockerfile
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: './Dockerfile.release'
verbose: true
failure-threshold: error
-
name: Shellcheck package install script
uses: sudo-bot/action-shellcheck@latest
with:
cli-args: "docker_package_install.sh"
kali:
runs-on: ubuntu-22.04
needs: lint
steps:
-
name: Set up QEMU
uses: docker/setup-qemu-action@v2
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
-
name: Build on linux/amd64
uses: docker/build-push-action@v3
with:
platforms: linux/amd64
build-args: IMAGE_BASE=kalilinux/kali-rolling:latest
push: false
|
End of preview. Expand
in Data Studio
No dataset card yet
- Downloads last month
- 14