Dataset Viewer
Auto-converted to Parquet Duplicate
instruction
stringlengths
108
315
input
stringclasses
1 value
output
stringlengths
99
9.93M
Explain the purpose of the module 'aircrack-ng/.clang-format'. Describe how it is used in security workflows. Language: unknown.
--- AlignAfterOpenBracket: Align AlignConsecutiveAssignments: false AlignConsecutiveDeclarations: false AlignOperands: true AlignTrailingComments: false AllowShortCaseLabelsOnASingleLine: false AllowShortFunctionsOnASingleLine: All AllowShortIfStatementsOnASingleLine: true AllowShortLoopsOnASingleLine: true AlwaysBreakBeforeMultilineStrings: false BinPackArguments: false BinPackParameters: false BreakBeforeBinaryOperators: All BreakBeforeBraces: Allman BreakBeforeTernaryOperators: true ColumnLimit: 80 ContinuationIndentWidth: 4 IndentCaseLabels: true IndentWidth: 4 MaxEmptyLinesToKeep: 1 NamespaceIndentation: None PointerAlignment: Middle ReflowComments: false SortIncludes: false SpaceAfterCStyleCast: true SpaceBeforeAssignmentOperators: true SpaceBeforeParens: ControlStatements SpaceInEmptyParentheses: false SpacesInAngles: false SpacesInParentheses: false SpacesInSquareBrackets: false Standard: Cpp11 TabWidth: 4 UseTab: Always
Explain the purpose of the module 'aircrack-ng/.codespellrc'. Describe how it is used in security workflows. Language: unknown.
[codespell] skip = *.patch,./LICENSE.OpenSSL,./test/password.lst,./test/password-2.lst,./test/password-3.lst, ignore-words-list = aci,ba,curent,datas,inout,keep-alives,nnumber,overthere,parm,parms,ue,varian,wan
Explain the purpose of the module 'aircrack-ng/.coverityignore'. Describe how it is used in security workflows. Language: unknown.
apparmor/ contrib/ manpages/ patches/ scripts/ .github/ .vscode/ .clang-format .editorconfig .gitignore .pre-commit-config.yaml AC_VERSION.in AUTHORS centos_autotools.sh ChangeLog docker_package_install.sh Dockerfile Dockerfile.release INSTALLING LICENSE.OpenSSL README SECURITY.md
Explain the purpose of the module 'aircrack-ng/.editorconfig'. Describe how it is used in security workflows. Language: unknown.
[*] charset=utf-8 end_of_line=lf insert_final_newline=false indent_style=tab indent_size=4 [{*.c,*.cp,*.cc,*.hpp,*.cpp,*.tcc,*.hp,*.cxx,*.icc,*.mm,*.hxx,*.ii,*.hh,*.m,*.i,*.h,*.h++,*.c++,*.pch,*.inl}] indent_style=tab indent_size=4 insert_final_newline=false [{CMakeLists.txt,*.cmake}] indent_style=space indent_size=2 [{Makefile.*,Makefile,GNUmakefile,makefile,*.mk}] indent_style=tab tab_width=2 [{*.yml,*.yaml}] indent_style=space indent_size=2 [appveyor.yml] end_of_line=crlf
Explain the purpose of the module 'aircrack-ng/.gitignore'. Describe how it is used in security workflows. Language: unknown.
/*-ng /besside-ng-crawler /ivstools /kstats /wpaclean src/osdep/.os.Linux src/osdep/libosdep.a src/tags tags *.a *.so *.dll *.o *.exe *.log *.trs *.zip *.tar.* common.cfg Makefile.in aclocal.m4 autom4te.cache/ compile /config.h /config.h.in config.guess config.log config.status config.sub configure install-sh libtool ltmain.sh missing reautogen.sh src/Makefile.in *.lo .deps .libs .dirstamp /depcomp /aminclude_static.am /stamp-h1 *.la *.gcda *.gcno *.orig /test-driver /**/*-coverage.info /**/*-coverage /**/*.log /**/*.trs /scripts/airdrop-ng/build /scripts/airgraph-ng/build /test-calc-4pmk /test-calc-mic /test-calc-pmk /test-calc-ptk /test-cipher-arcfour /test-decrypt-ccmp /test-digest-md5 /test-digest-sha1 /test-encrypt-ccmp /test-encrypt-wep /test-hex_string_to_array /test-kdf-pbkdf2-hmac-sha1 /test-mac-hmac-md5 /test-mac-hmac-sha1 /test-mac-hmac-sha256 /build/m4/stubs/* !/build/m4/stubs/.gitkeep /test/test-env.sh /.idea /.clang_complete CMakeLists.txt /cmake-build-* *.gcda *.gcno Makefile !/contrib/commview/Makefile !/contrib/airpcap/Makefile !/contrib/peek/Makefile !/scripts/airgraph-ng/lib/Makefile /scripts/airmon-ng /benchmark.csv /.cccc /cccc.opt /.scannerwork /.bash_history /.cproject /.lesshst /.project /.rpmdb /.settings benchmark*.csv /bw-output compile_commands.json coverage*.info /test/cryptounittest/default.profraw /test-calc-one-pmk /test-string-has-suffix /test-wpapsk /test-wpapsk-cmac /test-circular-buffer /test-circular-queue /GPATH /GRTAGS /GSYMS /GTAGS /VERSION /AC_VERSION /aminclude_static.am /config.h /config.h.in /include/aircrack-ng/version.h /manpages/*.1 /manpages/*.8 /.ccls-cache /.cache /.gdb_history /cscope* /strace_out /.clangd /r*hs /r*hs-bad /r*tr /r*tr-bad *~ *.pidb /.vscode/settings.json /infer-out/
Explain the purpose of the module 'aircrack-ng/.pre-commit-config.yaml'. Describe how it is used in security workflows. Language: YAML.
--- # See https://pre-commit.com for more information # See https://pre-commit.com/hooks.html for more hooks exclude: > (?x)^( .github/|AUTHORS|ChangeLog|INSTALLING|LICENSE|README| appveyor.yml|build/airpcap.dll.def|contrib/|lib/csharp| lib/radiotap|include/aircrack-ng/third-party|patches/| test/|scripts/|manpages/|apparmor/ ) fail_fast: false repos: - repo: https://github.com/pre-commit/pre-commit-hooks rev: v4.0.1 hooks: - id: trailing-whitespace exclude_types: [asm] - id: check-added-large-files - id: mixed-line-ending exclude_types: [asm] - id: check-byte-order-marker - id: check-executables-have-shebangs - id: check-merge-conflict - repo: https://github.com/pocc/pre-commit-hooks rev: v1.3.5 hooks: - id: clang-format args: ["--style=file", "-i"] - repo: https://github.com/shellcheck-py/shellcheck-py rev: v0.7.2.1 hooks: - id: shellcheck files: 'test/|scripts/|build/' - repo: https://github.com/hadolint/hadolint rev: v2.12.0 hooks: - id: hadolint files: 'Dockerfile|Dockerfile.release'
Explain the purpose of the module 'aircrack-ng/AUTHORS'. Describe how it is used in security workflows. Language: unknown.
Original Author =============== Thomas d'Otreppe <tdotreppe@aircrack-ng.org> Contributors ============ * Zero Chaos - Airmon-ng maintainer - Occasional driver patch fixer - Driver tester * Joseph Benden <joe@aircrack-ng.org> - Instituted the project's coding style & formatting guidelines - Performed conversion from Subversion and Trac to GitHub - Continuous Integration: Buildbot system as well as AppVeyor setup and tuning TravisCI - Converted project from Makefiles to an Autotools-based build - Forged the WPA cracking engine; capable of linearly scaling up to at least 96 cores - Dynamically utilize the best SIMD instructions, at run-time, instead of build-time - Improved compilation on non-x86 platforms - Fixed many issues relating to SIMD on non-x86 architectures * Levert - Initial Subversion, trac and buildbot set-up * Andrea Bittau - osdep: OS-dependant capture/injection layer conditionally (OS) compiled * hirte (Martin Beck) <martin.beck2@gmx.de> - Aircrack-ng: implementation of PTW, KoreK attack speedup - Aireplay-ng: Fragmentation attack, Shared Key Authentication attack, injection test, hirte attack, Caffe Latte, Client Fragmentation, using two wireless interfaces in aireplay-ng (one for capture, one for injection) - Airodump-ng: Screen formatting and layout improvements - ieee80211 and mac80211 driver patches and driver-related changes/fixes in the tools - osdep improvements (mac80211 among other things) and fixes - New tools: airtun-ng, tkiptun-ng, airserv-ng, airdriver-ng, airbase-ng - IVS file format - airmon-ng improvements - Partial handshake cracking and detection * Carlos Lopez <clopez@igalia.com> - Added support for gcrypt instead of openssl - Crypto unit tests and tests for other tools - Manpage reorganization and improvements - Makefile fixes and improvements - Travis CI set-up - Airodump-ng: --manufacturer, --wps options * DarkAudax - Wiki: Documentation and tutorials - Added unit tests * ASPj (Pedro Larbig) - Driver-related fixes - New tools: Airtun-ng - ieee80211 driver patches (ipw3945, rt73, rt2570, prism2) - MDK3 - WDS support in different tools - besside-ng-crawler * Leandro Meiners <lmeiners@coresecurity.com/gmail.com> and Diego Sor <dsor@coresecurity.com/diegos@gmail.com> - WPA Migration mode attack and documentation * nathanh2011 - Revamped GPS logging functionality and added logcsv format * XayOn - Airoscript-ng - Airgraph-ng and airdrop-ng improvements * Daouid - Airoscript * Chris Lundquist - Aircrack-ng: Crack HCCAPx files - Aircrack-ng: Improve loading speed of large capture files - Aircrack-ng: Improve processing speed of large capture files * kimocoder (Christian B.) <kimocoder@aircrack-ng.org> - rtl8812au driver * dzk|kuro <dzk.kuro@gmail.com> - Initial capture/injection on BSD * Erik Tews <e_tews@cdc.informatik.tu-darmstadt.de> - Author of PTW attack * Loris Degioanni - Airpcap support * NetRoller3D - mac80211 driver patches and related fixes/improvements in osdep - Airmon-ng fixes - Radiotap support (and PPI detection) in various tools - Airdriver-ng improvements * Moshe Kaplan - Coverity Scan set-up - Memory leak and other fixes - AppArmor profiles * TheX1le (Ben Smith) - airgraph-ng - versuck-ng - airdrop-ng * nx5 (Alvaro Salmador) <naplam33@msn.com> - Aircrack-ng: WPA SSE2 implementation * Len White - Aircrack-ng: WPA AVX/AVX2 code porting from JTR * Tim de Waal - Airventriloquist-ng Thanks to ========= Alon Bar-Lev <alon.barlev@gmail.com> Almantsas Jano yh0- <yysjryysjr@gmail.com> Darko Sancanin <darko.sancanin@gmail.com> Fabrice Fontaine Julian Tyler LatinSud aka SuD layoyo Marohiver Michael Buesch <mb@bu3sch.de> myst404 Ryan Schmidt neheb (Rosen Penev) San Foxman Samuel Henrique tjt263 ZhaoChunsheng Kyle Fuller <inbox@kylefuller.co.uk> SemiSkimmedSteve mnt XBM5 Raúl Calvo Laorden Lars Engels darkfires Marks Mathy Vanhoef Wojciech Waga Gustavo Zacarias steev rmh Arnaud Fontaine beini yadox Ramiro Polla matrix.use.linux m4tr1x dan Christoph J. Thompson stsp Edgan Wiz Wouter van Kesteren buzzsaw slyfox Sergei Trofimovich mrpisto Paul Fertser impulse32 jeroenimo iceblox Ludovic Drolez Christian Mock Weedy ... and to anybody else who contributed, who, sometimes wishes to remain anonymous.
Explain the purpose of the module 'aircrack-ng/autogen.sh'. Describe how it is used in security workflows. Language: Shell Script.
#!/bin/sh # # Aircrack-ng # # Copyright (C) 2017 Joseph Benden <joe@benden.us> # # Autotool support was written by: Joseph Benden <joe@benden.us> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA # # In addition, as a special exception, the copyright holders give # permission to link the code of portions of this program with the # OpenSSL library under certain conditions as described in each # individual source file, and distribute linked combinations # including the two. # # You must obey the GNU General Public License in all respects # for all of the code used other than OpenSSL. # # If you modify file(s) with this exception, you may extend this # exception to your dnl version of the file(s), but you are not obligated # to do so. # # If you dnl do not wish to do so, delete this exception statement from your # version. # # If you delete this exception statement from all source files in the # program, then also delete it here. set -euf test -n "${srcdir:-}" || srcdir="$(dirname "$0")" test -n "${srcdir:-}" || srcdir=. cd "$srcdir" missing_tool() { _prog="$1" _env="$2" echo "Could not auto-detect '${_prog}'; please install or specify the '${_env}' environment variable." exit 1 } if [ -z "${LIBTOOLIZE:-}" ]; then if which libtoolize >/dev/null 2>/dev/null; then LIBTOOLIZE="$(which libtoolize 2>/dev/null)" elif which glibtoolize >/dev/null 2>/dev/null; then LIBTOOLIZE="$(which glibtoolize 2>/dev/null)" else missing_tool libtoolize LIBTOOLIZE fi fi if [ -z "${ACLOCAL:-}" ]; then if which aclocal >/dev/null 2>/dev/null; then ACLOCAL="$(which aclocal 2>/dev/null)" else missing_tool aclocal ACLOCAL fi fi if [ -z "${AUTOCONF:-}" ]; then if which autoconf >/dev/null 2>/dev/null; then AUTOCONF="$(which autoconf 2>/dev/null)" else missing_tool autoconf AUTOCONF fi fi if [ -z "${AUTOHEADER:-}" ]; then if which autoheader >/dev/null 2>/dev/null; then AUTOHEADER="$(which autoheader 2>/dev/null)" else missing_tool autoheader AUTOHEADER fi fi if [ -z "${AUTOMAKE:-}" ]; then if which automake >/dev/null 2>/dev/null; then AUTOMAKE="$(which automake 2>/dev/null)" else missing_tool automake AUTOMAKE fi fi "$LIBTOOLIZE" --force --copy --automake "$ACLOCAL" -I build/m4/stubs -I build/m4 ${ACLOCAL_FLAGS:-} "$AUTOCONF" "$AUTOHEADER" "$AUTOMAKE" \ --gnu --add-missing --force --copy \ -Wno-portability -Wno-portability { cat <<EOF #!/usr/bin/env bash ./autogen.sh "$@" "\$@" EOF } > reautogen.sh chmod +x reautogen.sh if [ -n "${NOCONFIGURE:-}" ]; then echo "Done. ./configure skipped." exit $? fi exec ./configure "$@"
Explain the purpose of the module 'aircrack-ng/centos_autotools.sh'. Describe how it is used in security workflows. Language: Shell Script.
#!/bin/sh # Install newer version of autotools, automake, libtool, and pkgconfig on CentOS 7 if [ ! -f /etc/os-release ]; then echo 'os-release not present, aborting' exit 1 fi . /etc/os-release # Untested on Red Hat if [ "x${ID}" != 'xcentos' ] && [ "x${ID}" != 'xredhat' ]; then echo 'OS is not CentOS or Red Hat, aborting' exit 1 fi if [ "x${VERSION_ID}" != 'x7' ]; then echo "Invalid CentOS/Red Hat version. Expected 7, got ${VERSION_ID}, aborting" exit 1 fi yum install epel-release # Install packages if not already present # Yeah, automake is required to build a newer version of automake PACKAGES="tar glib2-devel gcc gcc-c++ make m4 perl-Data-Dumper help2man automake" NB_INSTALLED_PKG=$(yum list install ${PACKAGES} | sed -n '/Installed Packages/,$p' | wc -l) # Count includes the "Installed Packages" line, so decreasing count by 1 NB_INSTALLED_PKG=$((NB_INSTALLED_PKG-1)) NB_PKG=$(echo ${PACKAGES} | wc -w) [ ${NB_PKG} -ne ${NB_INSTALLED_PKG} ] && yum install ${PACKAGES} autoconf_version=2.69 automake_version=1.16.1 libtool_version=2.4.6 pkgconf_version=0.29 TMP_DIR=$(mktemp -d) cd ${TMP_DIR} echo "Installing autoconf ${autoconf_version}" curl -L http://ftp.gnu.org/gnu/autoconf/autoconf-${autoconf_version}.tar.xz > autoconf-${autoconf_version}.tar.xz \ && tar xJf autoconf-${autoconf_version}.tar.xz \ && cd autoconf-${autoconf_version} \ && ./configure --prefix=/usr/local \ && make \ && make install \ && cd .. # Requires autoconf 2.65+ echo "Installing automake ${automake_version}" curl -L http://ftp.gnu.org/gnu/automake/automake-${automake_version}.tar.xz > automake-${automake_version}.tar.xz \ && tar xJf automake-${automake_version}.tar.xz \ && cd automake-${automake_version} \ && ./configure --prefix=/usr/local \ && make \ && make install \ && cd .. echo "Installing libtool ${libtool_version}" curl -L http://ftp.gnu.org/gnu/libtool/libtool-${libtool_version}.tar.xz > libtool-${libtool_version}.tar.xz \ && tar xJf libtool-${libtool_version}.tar.xz \ && cd libtool-${libtool_version} \ && ./configure --prefix=/usr/local \ && make \ && make install \ && cd .. echo "Installing pkg-config ${pkgconf_version}" curl -L https://pkg-config.freedesktop.org/releases/pkg-config-${pkgconf_version}.tar.gz > pkg-config-${pkgconf_version}.tar.gz \ && tar xzf pkg-config-${pkgconf_version}.tar.gz \ && cd pkg-config-${pkgconf_version} \ && ./configure --prefix=/usr/local --libdir=/usr/lib64 \ && make \ && make install \ && cd .. echo 'Done'
Explain the purpose of the module 'aircrack-ng/configure.ac'. Describe how it is used in security workflows. Language: unknown.
# Aircrack-ng # # Copyright (C) 2017-2022 Joseph Benden <joe@benden.us> # # Autotool support was written by: Joseph Benden <joe@benden.us> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA # # In addition, as a special exception, the copyright holders give # permission to link the code of portions of this program with the # OpenSSL library under certain conditions as described in each # individual source file, and distribute linked combinations # including the two. # # You must obey the GNU General Public License in all respects # for all of the code used other than OpenSSL. # # If you modify file(s) with this exception, you may extend this # exception to your # version of the file(s), but you are not obligated # to do so. # # If you # do not wish to do so, delete this exception statement from your # version. # # If you delete this exception statement from all source files in the # program, then also delete it here. m4_pattern_allow([AC_VERSION]) m4_define([version_date], "May 2022") m4_define([version_major], 1) m4_define([version_minor], 7) m4_define([version_micro], 0) m4_define([version_beta], 0) m4_define([version_rc], 0) m4_define([version_scm],[m4_translit(m4_esyscmd([$(pwd)/evalrev . scm || echo]),m4_newline)]) m4_define([version_triplet],version_major.version_minor.version_micro) m4_append([version_triplet],version_scm) AC_PREREQ([2.59]) AC_INIT([aircrack-ng],[version_triplet],[https://github.com/aircrack-ng/aircrack-ng/discussions]) # # Cross-Compilation # AC_CANONICAL_BUILD AC_CANONICAL_HOST AC_CANONICAL_TARGET # # Initialize Automake # AC_CONFIG_AUX_DIR([.]) AC_CONFIG_MACRO_DIR([build/m4/stubs]) AC_CONFIG_HEADERS([config.h]) AM_INIT_AUTOMAKE([1.14 dist-bzip2 dist-zip foreign subdir-objects]) AM_MAINTAINER_MODE([disable]) AC_SUBST([ACLOCAL_AMFLAGS], ["-I build/m4/stubs -I build/m4 \${ACLOCAL_FLAGS}"]) m4_ifdef([AM_SILENT_RULES], [AM_SILENT_RULES([yes])]) # # Ensure MAKE is GNU compatible # if ! ${MAKE-make} --version /cannot/make/this >/dev/null 2>&1; then AC_MSG_ERROR([you don't seem to have GNU make; it is required]) fi # # Find tooling # AIRCRACK_NG_PROG_CC AIRCRACK_NG_PROG_CXX AX_CXX_COMPILE_STDCXX([17], [ext], [optional]) if test "$HAVE_CXX17" = "0"; then AX_CXX_COMPILE_STDCXX([14], [ext], [optional]) if test "$HAVE_CXX14" = "0"; then AX_CXX_COMPILE_STDCXX([11], [ext], [mandatory]) fi fi AC_PROG_INSTALL AM_PROG_AS PKG_PROG_PKG_CONFIG AM_PROG_CC_C_O AC_C_CONST AC_PROG_EGREP AC_CHECK_HEADERS([locale.h stdio.h stdarg.h fcntl.h malloc.h stdlib.h string.h strings.h unistd.h sys/stat.h getopt.h sys/time.h sys/types.h dirent.h]) # # Set versioning detail # AC_SUBST([_MAJ], [version_major]) AC_SUBST([_MIN], [version_minor]) AC_SUBST([_SUB_MIN], [version_micro]) AC_SUBST([_BETA], [version_beta]) AC_SUBST([_RC], [version_rc]) AC_SUBST([_SCM], [version_scm]) AC_SUBST([LT_VER], [version_major.version_minor.version_micro]) AC_SUBST([MAN_RELEASE_DATE], [version_date]) AC_SUBST([MAN_RELEASE_VERSION], ["Version version_triplet"]) AC_DEFINE([_REVISION], ["version_triplet"], [The version information of the project]) AC_DEFINE([LT_CYGWIN_VER], ["-version_major-version_minor-version_micro.dll"], [The Cygwin DLL version string suffix]) # # Initialize libtool # LT_INIT([win32-dll disable-static shared]) # # Operating Systems # AIRCRACK_NG_MAC AIRCRACK_NG_WINDOWS AIRCRACK_NG_OS_DETECT # # Required # AIRCRACK_NG_CRYPTO AIRCRACK_NG_ETHTOOL AIRCRACK_NG_LIBNL # # Optional # AIRCRACK_NG_AIRPCAP AIRCRACK_NG_EXPECT AIRCRACK_NG_EXPERIMENTAL AIRCRACK_NG_EXT_SCRIPTS AIRCRACK_NG_HWLOC AIRCRACK_NG_PCAP AIRCRACK_NG_PCRE AIRCRACK_NG_RFKILL AIRCRACK_NG_SQLITE AIRCRACK_NG_ZLIB PKG_CHECK_MODULES([CMOCKA], [cmocka], [ CMOCKA_FOUND=yes AC_SUBST([CMOCKA_CFLAGS]) AC_SUBST([CMOCKA_LIBS]) ], [CMOCKA_FOUND=no]) # # Extras, but needed # AIRCRACK_NG_LARGEFILE AIRCRACK_NG_PTHREAD AX_LIB_SOCKET_NSL AC_CHECK_LIB([dl], [dlopen], [ LIBS="$LIBS -ldl" ], [:]) AC_CHECK_LIB([m], [sin], [ LIBS="$LIBS -lm" ], [:]) AIRCRACK_NG_COMPAT saved_cflags="$CFLAGS" CFLAGS="" AC_CHECK_FUNCS([posix_memalign aligned_alloc memalign __mingw_aligned_malloc _aligned_malloc], break) CFLAGS="$saved_cflags" # # Code Coverage Support # AIRCRACK_NG_CODE_COVERAGE # # Compiler set-up # AIRCRACK_NG_COMPILER_C AIRCRACK_NG_COMPILER_CXX # # Processor feature selection/detection # AIRCRACK_NG_SIMD_C AIRCRACK_NG_SIMD_CXX # # Optional analyzers # AIRCRACK_NG_ASAN AIRCRACK_NG_DUMA AIRCRACK_NG_JEMALLOC AIRCRACK_NG_TCMALLOC AIRCRACK_NG_TSAN # # Automake # AM_CONDITIONAL([HAVE_AIRPCAP_OR_PCAP], [test "$AIRPCAP" = yes -o "$PCAP_FOUND" = yes]) AM_CONDITIONAL([MULTIBIN], [test "$with_multibin" = yes]) AM_CONDITIONAL([ENABLE_INSTALLED_TESTS], [test "nope" = yes]) # for glib tests AM_CONDITIONAL([CMOCKA], [test "$CMOCKA_FOUND" = yes]) AM_CONDITIONAL([STATIC_BUILD], [test "$enable_static" = yes]) AM_CONDITIONAL([EXPECT], [test "$EXPECT_FOUND" = yes]) # # Save flags for build summary # summary_cflags="$CFLAGS" summary_cxxflags="$CXXFLAGS" summary_cppflags="$CPPFLAGS" summary_libs="$LIBS" # # Set final flags for build # CFLAGS="$opt_cflags $CFLAGS" CPPFLAGS="$opt_cppflags $CPPFLAGS" CXXFLAGS="$opt_cxxflags $CXXFLAGS" LDFLAGS="$opt_ldflags $LDFLAGS" LIBS="$opt_libs $LIBS" # # Generate all build files # AC_CONFIG_FILES([ Makefile AC_VERSION include/aircrack-ng/version.h manpages/airbase-ng.8 manpages/aircrack-ng.1 manpages/airdecap-ng.1 manpages/airdecloak-ng.1 manpages/aireplay-ng.8 manpages/airmon-ng.8 manpages/airodump-ng.8 manpages/airodump-ng-oui-update.8 manpages/airolib-ng.1 manpages/airserv-ng.8 manpages/airtun-ng.8 manpages/airventriloquist-ng.8 manpages/besside-ng.8 manpages/besside-ng-crawler.1 manpages/buddy-ng.1 manpages/easside-ng.8 manpages/ivstools.1 manpages/kstats.1 manpages/Makefile manpages/makeivs-ng.1 manpages/packetforge-ng.1 manpages/tkiptun-ng.8 manpages/wesside-ng.8 manpages/wpaclean.1 scripts/Makefile scripts/airdrop-ng/Makefile scripts/airdrop-ng/doc/Makefile scripts/airgraph-ng/Makefile scripts/airgraph-ng/man/Makefile scripts/versuck-ng/Makefile test/test-env.sh ]) AC_OUTPUT # # Output a summary of the build to be performed # cat <<EOF ${PACKAGE} ${VERSION} Build Environment: Build Machine: ${build} Host Machine: ${host} Target Machine: ${target} Install Prefix: ${prefix} Compiler Environment: C Compiler: ${CC} C++ Compiler: ${CXX} Python: ${PYTHON} CFLAGS: ${summary_cflags} CXXFLAGS: ${summary_cxxflags} CPPFLAGS: ${summary_cppflags} LDFLAGS: ${LDFLAGS} LIBS: ${summary_libs} Optimized CFLAGS: ${opt_cflags} Optimized CXXFLAGS: ${opt_cxxflags} Optimized CPPFLAGS: ${opt_cppflags} Optimized LDFLAGS: ${opt_ldflags} Optimized LIBS: ${opt_libs} Target Environment: OS: ${OS} ASAN: ${asan} CPU L1 cache-line size: ${CACHELINE_SIZE} LTO ${with_lto:-no} Crypto Libraries: Crypto Engine: ${CRYPTO_TYPE} Gcrypt: ${GCRYPT_LIBS} OpenSSL: ${OPENSSL_LIBS} Required Libraries: Ethtool: ${ETHTOOL_FOUND} Libnl: ${NLLIBNAME_FOUND} Optional Libraries: Airpcap: ${AIRPCAP} Cmocka: ${CMOCKA_FOUND} DUMA: ${DUMA} Hwloc: ${HAVE_HWLOC} Jemalloc: ${JEMALLOC} Pcap: ${PCAP_FOUND} Pcre: ${HAVE_PCRE} Pcre2: ${HAVE_PCRE2} ${PCRE2_NOTE} Sqlite: ${HAVE_SQLITE3} Tcmalloc: ${TCMALLOC} Zlib: ${HAVE_ZLIB} Features: CMAC Support: ${HAVE_CMAC} Experimental Extra Scripts: ${EXT_SCRIPTS} Experimental Features: ${EXPERIMENTAL} EOF
Explain the purpose of the module 'aircrack-ng/Dockerfile'. Describe how it is used in security workflows. Language: unknown.
ARG IMAGE_BASE=debian:unstable-slim # hadolint ignore=DL3006 FROM ${IMAGE_BASE} AS builder # Install dependencies for building COPY docker_package_install.sh / RUN sh /docker_package_install.sh builder # Build Aircrack-ng # hadolint ignore=DL3059 RUN mkdir -p /aircrack-ng /output COPY . /aircrack-ng WORKDIR /aircrack-ng # hadolint ignore=SC2006 RUN set -x \ && make distclean || : && \ autoreconf -vif && \ set -e; \ ./configure --with-experimental --with-ext-scripts --enable-maintainer-mode --prefix=/usr/local && \ make -j3 && \ set +e && \ if ! make check -j3; then \ echo "Processor: $(uname -m)"; \ for file in `grep -l "(exit status: [1-9]" test/*.log`; do \ echo "[*] Test ${file}:"; \ cat "${file}"; \ done; \ exit 1; \ fi && \ set -e && \ make install DESTDIR=/output # Stage 2 # hadolint ignore=DL3006 FROM ${IMAGE_BASE} # Due to the behavior of buildx failing to copy to directories being # a symlink (whereas docker build works), copy the content to /output # then manually move all the files in /usr/local # In Arch-based distros, /usr/local/share/man is a symlink RUN mkdir /output COPY --from=builder /output/usr /output # And another workaround for Clear Linux where this directory does not exist # hadolint ignore=SC2015 RUN set -x && \ [ -d /usr/local/share/man ] || \ mkdir -p /usr/local/share/man RUN mv /output/local/share/man/* /usr/local/share/man/ && \ rmdir /output/local/share/man/ && \ cp -r /output/* /usr/ && \ rm -rf /output COPY docker_package_install.sh / # Install dependencies RUN set -x \ && sh /docker_package_install.sh stage2 \ && rm /docker_package_install.sh \ && aircrack-ng -u
Explain the purpose of the module 'aircrack-ng/Dockerfile.release'. Describe how it is used in security workflows. Language: unknown.
ARG IMAGE_BASE=debian:unstable-slim # hadolint ignore=DL3006 FROM ${IMAGE_BASE} AS builder # https://docs.github.com/en/actions/learn-github-actions/environment-variables#default-environment-variables # Tag name ARG GITHUB_REF_NAME # Install dependencies for building COPY docker_package_install.sh /opt RUN sh /opt/docker_package_install.sh builder # Create git archive # hadolint ignore=DL3059 RUN mkdir -p /aircrack-ng/git /aircrack-ng/archive /output COPY . /aircrack-ng/git WORKDIR /aircrack-ng/git # hadolint ignore=DL4006,SC3040 RUN set -o pipefail && \ git archive --format=tar ${GITHUB_REF_NAME} \ | tar -xf - --directory /aircrack-ng/archive # Build Aircrack-ng WORKDIR /aircrack-ng/archive RUN set -x \ && make distclean || : && \ autoreconf -vif && \ set -e; \ ./configure --with-experimental --with-ext-scripts --enable-maintainer-mode --without-opt --prefix=/usr && \ make -j3 && \ make check -j3 && \ make install DESTDIR=/output # Stage 2 # hadolint ignore=DL3006 FROM ${IMAGE_BASE} # Due to the behavior of buildx failing to copy to directories being # a symlink (whereas docker build works), copy the content to /output # then manually move all the files in /usr/local # In Arch-based distros, /usr/local/share/man is a symlink RUN mkdir /output COPY --from=builder /output/usr /output # And another workaround for Clear Linux where this directory does not exist # hadolint ignore=SC2015 RUN set -x && \ [ -d /usr/local/share/man ] || \ mkdir -p /usr/local/share/man RUN mv /output/local/share/man/* /usr/local/share/man/ && \ rmdir /output/local/share/man/ && \ cp -r /output/* /usr/ && \ rm -rf /output COPY docker_package_install.sh / # Install dependencies RUN set -x \ && sh /docker_package_install.sh stage2 \ && rm /docker_package_install.sh \ && aircrack-ng -u
Explain the purpose of the module 'aircrack-ng/docker_package_install.sh'. Describe how it is used in security workflows. Language: Shell Script.
#!/bin/sh echo "[*] Installing packages" STEP=$1 if [ -z "$STEP" ]; then echo "[!] Must specify 'builder' or 'stage2' as arguments" exit 1 elif [ "$STEP" = 'builder' ]; then echo "[*] Builder step" elif [ "$STEP" = 'stage2' ]; then echo "[*] Stage2 step" fi # Load OS info # shellcheck source=/dev/null . /etc/os-release if [ "${ID}" = 'debian' ] || [ "${ID_LIKE}" = 'debian' ]; then [ "${ID_LIKE}" = 'debian' ] && echo "[*] Detected debian-based distro: ${ID} (${VERSION_ID})" [ "${ID}" = 'debian' ] && echo "[*] Detected debian (${VERSION_CODENAME}/${VERSION_ID})" if [ "${STEP}" = 'builder' ]; then apt-get update \ && export DEBIAN_FRONTEND=noninteractive \ && apt-get -y install --no-install-recommends \ build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev \ ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre2-dev libhwloc-dev \ libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils expect gawk bear \ libtinfo5 python3-pip git && \ rm -rf /var/lib/apt/lists/* elif [ "${STEP}" = 'stage2' ]; then apt-get update && \ apt-get -y install --no-install-recommends \ libsqlite3-0 libssl3 hwloc libpcre2-posix3 libnl-3-200 libnl-genl-3-200 iw usbutils pciutils \ iproute2 ethtool kmod wget ieee-data python3 python3-graphviz rfkill && \ rm -rf /var/lib/apt/lists/* fi elif [ "${ID}" = 'arch' ] || [ "${ID_LIKE}" = 'arch' ]; then [ "${ID}" = 'arch' ] && echo "[*] Detected Arch Linux" [ "${ID_LIKE}" = 'arch' ] && echo "[*] Detected Arch-based Linux: ${NAME} (${ID})" if [ "${STEP}" = 'builder' ]; then pacman -Sy --noconfirm base-devel libnl openssl ethtool util-linux zlib libpcap sqlite pcre2 hwloc \ cmocka hostapd wpa_supplicant tcpdump screen iw usbutils pciutils expect git \ python python-setuptools elif [ "${STEP}" = 'stage2' ]; then pacman -Sy --noconfirm libnl openssl ethtool util-linux zlib libpcap sqlite pcre2 hwloc iw usbutils \ pciutils python-graphviz python fi elif [ "${ID}" = 'alpine' ]; then echo "[*] Detected alpine" if [ "${STEP}" = 'builder' ]; then apk add --no-cache \ gcc g++ make autoconf automake libtool libnl3-dev openssl-dev ethtool libpcap-dev cmocka-dev \ hostapd wpa_supplicant tcpdump screen iw pkgconf util-linux sqlite-dev pcre2-dev linux-headers \ zlib-dev pciutils usbutils expect hwloc-dev git python3 expect gawk bear py3-pip elif [ "${STEP}" = 'stage2' ]; then apk add --no-cache \ libnl3 openssl ethtool libpcap util-linux sqlite-dev pcre2 zlib pciutils usbutils hwloc wget \ iproute2 kmod python3 py3-graphviz urfkill iw fi elif [ "${ID}" = 'fedora' ] || [ "${ID}" = 'almalinux' ] || [ "${ID}" = 'rocky' ] || [ "${ID}" = 'ol' ]; then echo "[*] Distribution: ${NAME} (${VERSION_ID})" LIBPCAP=libpcap-devel CMOCKA=libcmocka-devel dnf distrosync -y --refresh if [ "${STEP}" = 'builder' ]; then if [ "${ID}" = 'almalinux' ] || [ "${ID}" = 'rocky' ]; then echo "[*] Install EPEL and enabling CRB" dnf install epel-release dnf-plugins-core -y dnf config-manager --set-enabled crb dnf distrosync -y --refresh elif [ "${ID}" = 'ol' ]; then echo "[*] Install EPEL" dnf install epel-release dnf-plugins-core -y dnf install xz cmake gcc -y LIBPCAP=libpcap # We're installing cmocka manually, not present in repos CMOCKA="" dnf distrosync -y --refresh cd /tmp || exit curl https://cmocka.org/files/1.0/cmocka-1.0.1.tar.xz -o cmocka-1.0.1.tar.xz tar -xf cmocka-1.0.1.tar.xz cd cmocka-1.0.1 || exit mkdir build cd build || exit cmake .. make make install # Otherwise tests will fail because it cannot open the shared library export LD_LIBRARY_PATH=/usr/local/lib:/usr/local/lib64 ldconfig cd / || exit fi dnf install -y libtool pkgconfig sqlite-devel autoconf automake openssl-devel ${LIBPCAP} \ pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel ${CMOCKA} \ make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel \ expect python3-pip python3-setuptools git elif [ "${STEP}" = 'stage2' ]; then GRAPHVIZ=python3-graphviz [ "${ID}" != 'fedora' ] && GRAPHVIZ=graphviz-python3 dnf install -y libnl3 openssl-libs zlib libpcap sqlite-libs pcre2 hwloc iw ethtool pciutils \ usbutils expect python3 ${GRAPHVIZ} iw util-linux ethtool kmod fi elif [ "${ID}" = 'opensuse-leap' ]; then echo "[*] Detected openSUSE Leap" if [ "${STEP}" = 'builder' ]; then zypper install -y autoconf automake libtool pkg-config libnl3-devel libopenssl-1_1-devel zlib-devel \ libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd screen \ wpa_supplicant tcpdump iw gcc-c++ gcc ethtool pciutils usbutils expect python3-pip \ python3-setuptools git elif [ "${STEP}" = 'stage2' ]; then zypper install -y libnl3-200 libopenssl1_1 zlib libpcap sqlite3 libpcre2-8-0 hwloc iw ethtool pciutils \ usbutils expect python3 python3-graphviz iw util-linux ethtool kmod fi elif [ "${ID}" = 'gentoo' ]; then echo "[*] Detected Gentoo" if [ "${STEP}" = 'builder' ]; then export EMERGE_DEFAULT_OPTS="--binpkg-respect-use=y --getbinpkg=y" cat <<EOF >/etc/portage/binrepos.conf [binhost] priority = 9999 sync-uri = https://gentoo.osuosl.org/experimental/amd64/binpkg/default/linux/17.1/x86-64/ EOF emerge --sync >/dev/null emerge app-portage/elt-patches dev-db/sqlite dev-lang/python dev-libs/libbsd dev-libs/libnl dev-libs/libpcre2 \ dev-libs/openssl dev-vcs/git net-libs/libpcap net-wireless/iw net-wireless/lorcon sys-apps/hwloc \ net-wireless/wireless-tools sys-apps/ethtool sys-apps/hwdata sys-apps/pciutils sys-apps/usbutils \ sys-devel/autoconf sys-devel/automake sys-devel/gnuconfig sys-devel/libtool sys-libs/zlib elif [ "${STEP}" = 'stage2' ]; then export EMERGE_DEFAULT_OPTS="--binpkg-respect-use=y --getbinpkg=y" cat <<EOF >/etc/portage/binrepos.conf [binhost] priority = 9999 sync-uri = https://gentoo.osuosl.org/experimental/amd64/binpkg/default/linux/17.1/x86-64/ EOF emerge --sync >/dev/null emerge dev-db/sqlite dev-lang/python dev-libs/libbsd dev-libs/libnl dev-libs/libpcre2 dev-libs/openssl \ net-libs/libpcap net-wireless/iw net-wireless/lorcon net-wireless/wireless-tools sys-apps/ethtool \ sys-apps/hwdata sys-apps/hwloc sys-apps/pciutils sys-apps/usbutils sys-libs/zlib app-portage/gentoolkit eclean --deep distfiles && eclean --deep packages emerge --depclean app-portage/gentoolkit rm -fr /var/db/repos/gentoo /etc/portage/binrepos.conf fi elif [ "${ID}" = 'clear-linux-os' ]; then echo "[*] Detected Clear Linux (${VERSION_ID})" if [ "${STEP}" = 'builder' ]; then # Build hostapd swupd bundle-add wget c-basic devpkg-openssl devpkg-libnl wget https://w1.fi/releases/hostapd-2.10.tar.gz tar -zxf hostapd-2.10.tar.gz cd hostapd-2.10/hostapd || exit 1 cp defconfig .config make make install hostapd -v # Install the rest of the packages swupd bundle-add devpkg-libgcrypt devpkg-hwloc devpkg-libpcap # Split it in multiple parts to avoid failure: "Error: Bundle too large by xxxxM" swupd bundle-add devpkg-pcre2 devpkg-sqlite-autoconf git swupd bundle-add ethtool network-basic software-testing swupd bundle-add sysadmin-basic wpa_supplicant os-testsuite elif [ "${STEP}" = 'stage2' ]; then # Break it in multiple steps to avoid the issue mentioned above swupd bundle-add libnl openssl devpkg-zlib devpkg-libpcap swupd bundle-add sqlite devpkg-pcre2 hwloc network-basic ethtool swupd bundle-add sysadmin-basic python-extras fi else echo "[!] Unsupported distro: ${ID} - PR welcome" exit 1 fi # shellcheck disable=SC2181 if [ $? -ne 0 ]; then echo '[!] ERROR, aborting' exit 1 fi exit 0
Explain the purpose of the module 'aircrack-ng/evalrev'. Describe how it is used in security workflows. Language: unknown.
#!/bin/sh set -euf DIR=${1:-} CMD=${2:-} SCM="" if [ x$DIR = "x" ] then DIR="." fi if test -d "${DIR}/.git"; then # # Locate the closest annotated tag # REVISION="$(git describe --abbrev=0 --tags 2>/dev/null || echo unknown)" # # Determine if we are a development branch, if so then append the # short SHA1. # EXACTLY="$(git describe --abbrev=0 --tags --exact-match 2>/dev/null || echo)" if test -z "$EXACTLY"; then REVISION="${REVISION}_rev-$(git rev-parse --verify --short HEAD)" SCM="_rev-$(git rev-parse --verify --short HEAD)" fi elif test -d "${DIR}/.svn"; then REVISION="_r$(svnversion $DIR 2> /dev/null | sed 's/[^0-9]*//g')" SCM="_r$(svnversion $DIR 2> /dev/null | sed 's/[^0-9]*//g')" if test x$REVISION = "x"; then REVISION="_r$(svn info $DIR 2> /dev/null | grep -i revision | sed 's/[^0-9]*//g')" SCM="_r$(svn info $DIR 2> /dev/null | grep -i revision | sed 's/[^0-9]*//g')" fi if test x$REVISION = "x"; then if test -f "${DIR}/.svn/entries"; then REVISION="_r$(cat ${DIR}/.svn/entries | grep -i revision | head -n 1 | sed 's/[^0-9]*//g')" SCM="_r$(cat ${DIR}/.svn/entries | grep -i revision | head -n 1 | sed 's/[^0-9]*//g')" fi fi if test x$REVISION = "x"; then REVISION="_r1" SCM="_r1" fi elif [ -n "${GITHUB_SHA}" ]; then SHORT_SHA_REVISION="$(echo ${GITHUB_SHA} | cut -b 1-8)" VERSION=$(cat ${DIR}/AC_VERSION 2>/dev/null) REVISION="${VERSION}_rev-${SHORT_SHA_REVISION}" SCM="_rev-${SHORT_SHA_REVISION}" else REVISION="$(cat ${DIR}/AC_VERSION 2>/dev/null)" fi if test "x$CMD" = "xscm"; then echo $SCM elif test "x$CMD" = "xquoted"; then echo \"$REVISION\" else echo $REVISION fi
Explain the purpose of the module 'aircrack-ng/INSTALLING'. Describe how it is used in security workflows. Language: unknown.
== Building == === Requirements === * Autoconf * Automake * Libtool * shtool * OpenSSL development package or libgcrypt development package. * Airmon-ng (Linux) requires ethtool, usbutils, and often pciutils. * On Windows, cygwin has to be used and it also requires w32api package. * On Windows, if using clang, libiconv and libiconv-devel * Linux: LibNetlink 1 or 3. It can be disabled by passing --disable-libnl to configure. * pkg-config (pkgconf on FreeBSD, DragonFlyBSD, OpenBSD and NetBSD) * FreeBSD, DragonFlyBSD, OpenBSD, NetBSD, Solaris and OS X with Macports: gmake * Linux/Cygwin: make and Standard C++ Library development package (Debian: libstdc++-dev) Note: Airmon-ng only requires pciutils if the system has a PCI/PCIe bus and it is populated. Such bus can be present even if not physically visible. For example, it is present, and populated on the Raspberry Pi 4, therefore pciutils is required on that device. === Optional stuff === * If you want SSID filtering with regular expression in airodump-ng (--essid-regex) PCRE or PCRE2 development package is required. * If you want to use airolib-ng and '-r' option in aircrack-ng, SQLite development package >= 3.3.17 (3.6.X version or better is recommended) * If you want to use Airpcap, the 'developer' directory from the CD/ISO/SDK is required. * In order to build besside-ng, besside-ng-crawler, easside-ng, tkiptun-ng and wesside-ng, libpcap development package is required (on Cygwin, use the Airpcap SDK instead; see above) * rfkill * If you want Airodump-ng to log GPS coordinates, gpsd is needed * For best performance on SMP machines, ensure the hwloc library and headers are installed. It is strongly recommended on high core count systems, it may give a serious speed boost * CMocka for unit testing * For integration testing on Linux only: tcpdump, HostAPd, WPA Supplicant and screen === Installing required and optional dependencies === Below are instructions for installing the basic requirements to build `aircrack-ng` for a number of operating systems. Note: CMocka, tcpdump, screen, HostAPd and WPA Supplicant should not be dependencies when packaging Aircrack-ng. ==== Linux ==== ===== Arch Linux ===== `sudo pacman -Sy base-devel libnl openssl ethtool util-linux zlib libpcap sqlite pcre2 hwloc cmocka hostapd wpa_supplicant tcpdump screen iw usbutils pciutils` ===== Debian/Ubuntu ===== `sudo apt-get install build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre2-dev libhwloc-dev libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils` ==== Fedora ==== `sudo yum install libtool pkgconfig sqlite-devel autoconf automake openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel` ==== CentOS/RHEL 7 ==== `sudo yum install epel-release` `sudo ./centos_autotools.sh` # Remove older installation of automake/autoconf `sudo yum remove autoconf automake` `sudo yum install sqlite-devel openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel` Note: autoconf, automake, libtool, and pkgconfig in the repositories are too old. The script centos_autotools.sh automatically installs dependencies to compile then install the tools. ==== CentOS/RHEL 8 ==== `sudo yum config-manager --set-enabled powertools` `sudo yum install epel-release` `sudo yum install git libtool pkgconfig sqlite-devel autoconf automake openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel` ===== openSUSE ===== `sudo zypper install autoconf automake libtool pkg-config libnl3-devel libopenssl-1_1-devel zlib-devel libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc ethtool pciutils usbutils` ===== Mageia ===== `sudo urpmi autoconf automake libtool pkgconfig libnl3-devel libopenssl-devel zlib-devel libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc make` ===== Alpine ===== `sudo apk add gcc g++ make autoconf automake libtool libnl3-dev openssl-dev ethtool libpcap-dev cmocka-dev hostapd wpa_supplicant tcpdump screen iw pkgconf util-linux sqlite-dev pcre2-dev linux-headers zlib-dev pciutils usbutils` Note: Community repository needs to be enabled for iw ==== Clear Linux ==== `sudo swupd bundle-add c-basic devpkg-openssl devpkg-libnl devpkg-hwloc devpkg-libpcap devpkg-pcre2 devpkg-sqlite-autoconf ethtool wget network-basic software-testing sysadmin-basic wpa_supplicant` Note: hostapd must be compiled manually, it is not present in the repository ==== BSD ==== ===== FreeBSD ===== `pkg install pkgconf shtool libtool gcc9 automake autoconf pcre2 sqlite3 openssl gmake hwloc cmocka` ===== DragonflyBSD ===== `pkg install pkgconf shtool libtool gcc8 automake autoconf pcre2 sqlite3 libgcrypt gmake cmocka` ===== OpenBSD ===== `pkg_add pkgconf shtool libtool gcc automake autoconf pcre2 sqlite3 openssl gmake cmocka` ===== NetBSD ===== `pkg_add pkgconf libtool gcc7 automake autoconf pcre2 sqlite3 openssl gmake cmocka` ==== macOS ==== XCode, Xcode command line tools and HomeBrew are required. `brew install autoconf automake libtool openssl shtool pkg-config hwloc pcre2 sqlite3 libpcap cmocka` ==== Windows ==== ===== Cygwin ===== Cygwin requires the full path to the `setup.exe` utility, in order to automate the installation of the necessary packages. In addition, it requires the location of your installation, a path to the cached packages download location, and a mirror URL. An example of automatically installing all the dependencies is as follows: `c:\cygwin\setup-x86.exe -qnNdO -R C:/cygwin -s http://cygwin.mirror.constant.com -l C:/cygwin/var/cache/setup -P autoconf -P automake -P bison -P gcc-core -P gcc-g++ -P mingw-runtime -P mingw-binutils -P mingw-gcc-core -P mingw-gcc-g++ -P mingw-pthreads -P mingw-w32api -P libtool -P make -P python -P gettext-devel -P gettext -P intltool -P libiconv -P pkg-config -P git -P wget -P curl -P libpcre2-devel -P libssl-devel -P libsqlite3-devel` ===== MSYS2 ===== `pacman -Sy autoconf automake-wrapper libtool msys2-w32api-headers msys2-w32api-runtime gcc pkg-config git python openssl-devel openssl libopenssl msys2-runtime-devel gcc binutils make pcre2-devel libsqlite-devel` === Docker containers === We have two repositories on DockerHub: - aircrackng/release (https://hub.docker.com/r/aircrackng/release): Each release - aircrackng/git (https://hub.docker.com/r/aircrackng/git): every commit in the git repository Base command for the git version: `sudo docker run --rm -it aircrackng/git` Available platforms/CPU architectures: - linux/386 (base image: debian:unstable-slim) - linux/amd64 (base image: debian:unstable-slim) - linux/arm/v5 (base image: debian:unstable-slim) - linux/arm/v6 (base image: alpine:3) - linux/arm/v7 (base image: debian:unstable-slim) - linux/arm64/v8 (base image: debian:unstable-slim) - linux/mips64le (base image: debian:unstable-slim) - linux/ppc64le (base image: debian:unstable-slim) - linux/riscv64 (base image: debian:unstable-slim) - linux/s390x (base image: debian:unstable-slim) === Compiling === To build `aircrack-ng`, the Autotools build system is utilized. Autotools replaces the older method of compilation. NOTE: If utilizing a developer version, eg: one checked out from source control, you will need to run a pre-`configure` script. The script to use is one of the following: `autoreconf -i` or `env NOCONFIGURE=1 ./autogen.sh`. First, `./configure` the project for building with the appropriate options specified for your environment: `./configure <options>` TIP: If the above fails, please see above about developer source control versions. Next, compile the project (respecting if `make` or `gmake` is needed): * Compilation: `make` * Compilation on *BSD or Solaris: `gmake` Finally, the additional targets listed below may be of use in your environment: * Execute all unit testing: `make check` * Execute all integration testing (requires root): `make integration` * Installing: `make install` * Uninstall: `make uninstall` ==== `./configure` flags ==== When configuring, the following flags can be used and combined to adjust the suite to your choosing: * with-airpcap=DIR: needed for supporting airpcap devices on windows (cygwin or msys2 only) Replace DIR above with the absolute location to the root of the extracted source code from the Airpcap CD or downloaded SDK available online. Required on Windows to build besside-ng, besside-ng-crawler, easside-ng, tkiptun-ng and wesside-ng when building experimental tools. The developer pack (Compatible with version 4.1.1 and 4.1.3) can be downloaded at https://support.riverbed.com/content/support/software/steelcentral-npm/airpcap.html * with-experimental: needed to compile tkiptun-ng, easside-ng, buddy-ng, buddy-ng-crawler, airventriloquist and wesside-ng. libpcap development package is also required to compile most of the tools. If not present, not all experimental tools will be built. On Cygwin, libpcap is not present and the Airpcap SDK replaces it. See --with-airpcap option above. * with-ext-scripts: needed to build `airoscript-ng`, `versuck-ng`, `airgraph-ng` and `airdrop-ng`. Note: Each script has its own dependencies. * with-gcrypt: Use libgcrypt crypto library instead of the default OpenSSL. And also use internal fast sha1 implementation (borrowed from GIT). Dependency (Debian): libgcrypt20-dev * with-duma: Compile with DUMA support. DUMA is a library to detect buffer overruns and underruns. Dependency (Debian): duma * disable-libnl: Set up the project to be compiled without libnl (1 or 3). Linux option only. * without-opt: Do not enable -O3 optimizations. * enable-shared: Make a OSdep a shared library. * disable-shared: When combined with enable-static, it will statically compile Aircrack-ng. * with-avx512: On x86, add support for AVX512 instructions in aircrack-ng. Only use it when the current CPU supports AVX512. * with-static-simd=<SIMD>: Compile a single optimization in aircrack-ng binary. Useful when compiling statically and/or for space-constrained devices. Valid SIMD options: x86-sse2, x86-avx, x86-avx2, x86-avx512, ppc-altivec, ppc-power8, arm-neon, arm-asimd. Must be used with --enable-static --disable-shared. When using those 2 options, the default is to compile the generic optimization in the binary. --with-static-simd merely allows to choose another one. * --enable-maintainer-mode: It is important to enable this flag when developing with Aircrack-ng. This flag enables additional compile warnings and safety features. ===== Examples ===== * Configure and compiling: `./configure --with-experimental` `make` * Compiling with gcrypt: `./configure --with-gcrypt` `make` * Installing: `make install` * Installing (strip binaries): `make install-strip` * Installing, with external scripts: `./configure --with-experimental --with-ext-scripts` `make` `make install` * Testing (with sqlite, experimental and pcre2) `./configure --with-experimental` `make` `make check` * Compiling on OS X with macports (and all options): `./configure --with-experimental` `gmake` * Compiling on macOS running on M1/AARCH64 and Homebrew: `autoreconf -vif` `env CPPFLAGS="-Wno-deprecated-declarations" ./configure --with-experimental` `make` `make check` * Compiling on OS X 10.10 with XCode 7.1 and Homebrew: `env CC=gcc-4.9 CXX=g++-4.9 ./configure` `make` `make check` *NOTE*: Older XCode ships with a version of LLVM that does not support CPU feature detection; which causes the `./configure` to fail. To work around this older LLVM, it is required that a different compile suite is used, such as GCC or a newer LLVM from Homebrew. If you wish to use OpenSSL from Homebrew, you may need to specify the location to its installation. To figure out where OpenSSL lives, run: `brew --prefix openssl` Use the output above as the DIR for `--with-openssl=DIR` in the `./configure` line: `env CC=gcc-4.9 CXX=g++-4.9 ./configure --with-openssl=DIR` `make` `make check` * Compiling on FreeBSD with gcc9 `env CC=gcc9 CXX=g++9 MAKE=gmake ./configure` `gmake` * Compiling on Cygwin with Airpcap (assuming Airpcap devpack is unpacked in Aircrack-ng directory) ``` cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-osdep cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-crypto cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-util dlltool -D Airpcap_Devpack/bin/x86/airpcap.dll -d build/airpcap.dll.def -l Airpcap_Devpack/bin/x86/libairpcap.dll.a autoreconf -i ./configure --with-experimental --with-airpcap=$(pwd) make ``` * Compiling on DragonflyBSD with gcrypt using GCC 8 ``` autoreconf -i env CC=gcc8 CXX=g++8 MAKE=gmake ./configure --with-experimental --with-gcrypt gmake ``` * Compiling on OpenBSD (with autoconf 2.69 and automake 1.16) ``` export AUTOCONF_VERSION=2.69 export AUTOMAKE_VERSION=1.16 autoreconf -i env MAKE=gmake ./configure gmake ``` * Compiling and debugging aircrack-ng ``` export CFLAGS='-O0 -g' export CXXFLAGS='-O0 -g' ./configure --with-experimental --enable-maintainer-mode --without-opt make LD_LIBRARY_PATH=.libs gdb --args ./aircrack-ng [PARAMETERS] ``` == IDE development == === VS Code - devcontainers === A VS Code development environment is provided, as is, for rapid setup of a development environment. This additionally adds support for GitHub Codespaces. ==== Requirements ==== The first requirement is a working Docker Engine (https://docs.docker.com/engine/install/) environment. Next, an installation of VS Code (https://code.visualstudio.com/) with the following extension(s): - Remote - Containers: https://marketplace.visualstudio.com/items?itemName=ms-vscode-remote.remote-containers by Microsoft. Note: The "Remote - Containers" extension will refuse to work with OSS Code. ==== Usage ==== 1. Clone this repository to your working folder: ``` $ git clone --recursive https://github.com/aircrack-ng/aircrack-ng.git $ cd aircrack-ng ``` 2. After cloning this repository, open the folder inside VS Code. ``` $ code . ``` IMPORTANT: You should answer "Yes", if it asks if the folder should be opened inside a remote container. If it does not ask, then press `Ctrl+Shift+P` and type `open in container`. This should bring up the correct command, for which pressing enter will run said command. 3. A number of warnings might appear about a missing `compile_commands.json` file. These are safe to ignore for a moment, as this file is automatically generated after the initial compilation. 4. Now build the entire project by pressing `Ctrl+R` and selecting `Build Full` from the pop-up menu that appears. 5. VS Code should detect the `compile_commands.json` file and ask if it should be used; selecting "Yes, always" will complete the initial setup of a fully working IDE. IMPORTANT: If it doesn't detect the file, pressing `Ctrl+Shift+P` and typing `reload window` will bring up the selection to fully reload the environment. 6. At this point, nearly all features of VS Code will function; from Intellisense, auto-completion, live documentation, to code formatting. Additionally, there are pre-configured tasks for builds and tests, as well as an example GDB/LLDB configuration for debugging `aircrack-ng`. == Packaging == Automatic detection of CPU optimization is done at run time. This behavior **is** desirable when packaging Aircrack-ng (for a Linux or other distribution.) Also, in some cases it may be desired to provide your own flags completely and not having the suite auto-detect a number of optimizations. To do this, add the additional flag `--without-opt` to the `./configure` line: `./configure --without-opt` == Using pre-compiled binaries == === Linux/BSD === Aircrack-ng is available in most distributions repositories. However, it is not always up-to-date. === Windows === * Install the appropriate "monitor" driver for your card; standard drivers don't work for capturing data. * Aircrack-ng suite is command line tools. So, you have to open a command-line `Start menu -> Run... -> cmd.exe` then use them * Run the executables without any parameters to have help == Documentation == Some more information is present in the README file. Documentation, tutorials, ... can be found on https://aircrack-ng.org Support is available in the GitHub Discussions (https://github.com/aircrack-ng/aircrack-ng/discussions) and on IRC (in #aircrack-ng on Libera Chat). Every tool has its own manpage. For aircrack-ng, `man aircrack-ng`
Explain the purpose of the module 'aircrack-ng/LICENSE'. Describe how it is used in security workflows. Language: unknown.
GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. <one line to give the program's name and a brief idea of what it does.> Copyright (C) <year> <name of author> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. <signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License.
Explain the purpose of the module 'aircrack-ng/LICENSE.OpenSSL'. Describe how it is used in security workflows. Language: unknown.
LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License --------------- /* ==================================================================== * Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * "This product includes software developed by the OpenSSL Project * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" * * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to * endorse or promote products derived from this software without * prior written permission. For written permission, please contact * openssl-core@openssl.org. * * 5. Products derived from this software may not be called "OpenSSL" * nor may "OpenSSL" appear in their names without prior written * permission of the OpenSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the OpenSSL Project * for use in the OpenSSL Toolkit (http://www.openssl.org/)" * * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * * This product includes cryptographic software written by Eric Young * (eay@cryptsoft.com). This product includes software written by Tim * Hudson (tjh@cryptsoft.com). * */ Original SSLeay License ----------------------- /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com). * The implementation was written so as to conform with Netscapes SSL. * * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@cryptsoft.com). * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young (eay@cryptsoft.com)" * The word 'cryptographic' can be left out if the rouines from the library * being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application code) you must include an acknowledgement: * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */
Explain the purpose of the module 'aircrack-ng/Makefile.am'. Describe how it is used in security workflows. Language: unknown.
# Aircrack-ng # # Copyright (C) 2017 Joseph Benden <joe@benden.us> # # Autotool support was written by: Joseph Benden <joe@benden.us> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA # # In addition, as a special exception, the copyright holders give # permission to link the code of portions of this program with the # OpenSSL library under certain conditions as described in each # individual source file, and distribute linked combinations # including the two. # # You must obey the GNU General Public License in all respects # for all of the code used other than OpenSSL. # # If you modify file(s) with this exception, you may extend this # exception to your dnl version of the file(s), but you are not obligated # to do so. # # If you dnl do not wish to do so, delete this exception statement from your # version. # # If you delete this exception statement from all source files in the # program, then also delete it here. AM_MAKEFLAGS = --no-print-directory ACLOCAL_AMFLAGS = -I build/m4/stubs -I build/m4 SUBDIRS = manpages \ scripts AM_CPPFLAGS = -I$(abs_srcdir) \ -I$(abs_builddir)/include \ -I$(abs_srcdir)/include \ -I$(abs_builddir)/lib \ -I$(abs_srcdir)/lib \ -I$(abs_builddir)/lib/radiotap \ -I$(abs_srcdir)/lib/radiotap \ $(CRYPTO_INCLUDES) \ $(CODE_COVERAGE_CPPFLAGS) CFLAGS += $(CODE_COVERAGE_CFLAGS) CXXFLAGS += $(CODE_COVERAGE_CXXFLAGS) LIBS += $(CODE_COVERAGE_LIBS) COMMON_CFLAGS = $(PTHREAD_CFLAGS) $(CRYPTO_CFLAGS) $(ZLIB_CFLAGS) COMMON_LDADD = $(PTHREAD_LIBS) $(CRYPTO_LDFLAGS) $(CRYPTO_LIBS) $(ZLIB_LIBS) bin_PROGRAMS = sbin_PROGRAMS = noinst_LTLIBRARIES = lib_LTLIBRARIES = EXTRA_DIST = AC_VERSION check_PROGRAMS = TESTS = INTEGRATION_TESTS = LIBACCRYPTO_LIBS = libaccrypto.la LIBAIRCRACK_CE_WEP_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wep.la LIBAIRCRACK_LIBS = libaircrack.la LIBAIRCRACK_OSDEP_LIBS= libaircrack-osdep.la if CYGWIN LIBAIRCRACK_OSDEP_LIBS+= -liphlpapi -lsetupapi endif LIBCOWPATTY_LIBS = libcowpatty.la LIBPTW_LIBS = libptw.la LIBRADIOTAP_LIBS = libradiotap.la LIBAIRCRACK_CE_WPA_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa.la LIBAIRCRACK_CE_WPA_X86_AVX512_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-x86-avx512.la LIBAIRCRACK_CE_WPA_X86_AVX2_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-x86-avx2.la LIBAIRCRACK_CE_WPA_X86_AVX_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-x86-avx.la LIBAIRCRACK_CE_WPA_X86_SSE2_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-x86-sse2.la LIBAIRCRACK_CE_WPA_ARM_NEON_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-arm-neon.la LIBAIRCRACK_CE_WPA_PPC_ALTIVEC_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-ppc-altivec.la LIBAIRCRACK_CE_WPA_PPC_POWER8_LIBS = $(LIBACCRYPTO_LIBS) libaircrack-ce-wpa-ppc-power8.la LIBAIRCRACK_CE_WPA_PATH = $(abs_top_builddir)/ include $(top_srcdir)/Makefile.integration.mk include $(top_srcdir)/include/Makefile.inc include $(top_srcdir)/lib/Makefile.inc include $(top_srcdir)/src/Makefile.inc include $(top_srcdir)/test/Makefile.inc include $(top_srcdir)/aminclude_static.am clean-local: code-coverage-clean distclean-local: code-coverage-dist-clean dist-hook: $(AM_V_GEN)echo $(VERSION) > $(distdir)/AC_VERSION
Explain the purpose of the module 'aircrack-ng/Makefile.integration.mk'. Describe how it is used in security workflows. Language: unknown.
INTEGRATION_TEST_SUITE_LOG = integration-test-suite.log am__set_INTEGRATION_TESTS_bases = \ bases='$(INTEGRATION_TEST_LOGS)'; \ bases=`for i in $$bases; do echo $$i; done | sed 's/\.log$$//'`; \ bases=`echo $$bases` am__integration_test_logs1 = $(INTEGRATION_TESTS:=.log) INTEGRATION_TEST_LOGS = $(am__integration_test_logs1:.log=.log) # Leading 'am--fnord' is there to ensure the list of targets does not # expand to empty, as could happen e.g. with make check TESTS=''. am--fnord $(INTEGRATION_TEST_LOGS) $(INTEGRATION_TEST_LOGS:.log=.trs): $(am__force_recheck) $(INTEGRATION_TEST_SUITE_LOG): $(INTEGRATION_TEST_LOGS) @$(am__set_INTEGRATION_TESTS_bases); \ am__f_ok () { test -f "$$1" && test -r "$$1"; }; \ redo_bases=`for i in $$bases; do \ am__f_ok $$i.trs && am__f_ok $$i.log || echo $$i; \ done`; \ if test -n "$$redo_bases"; then \ redo_logs=`for i in $$redo_bases; do echo $$i.log; done`; \ redo_results=`for i in $$redo_bases; do echo $$i.trs; done`; \ if $(am__make_dryrun); then :; else \ rm -f $$redo_logs && rm -f $$redo_results || exit 1; \ fi; \ fi; \ if test -n "$$am__remaking_logs"; then \ echo "fatal: making $(INTEGRATION_TEST_SUITE_LOG): possible infinite" \ "recursion detected" >&2; \ elif test -n "$$redo_logs"; then \ am__remaking_logs=yes $(MAKE) $(AM_MAKEFLAGS) $$redo_logs; \ fi; \ if $(am__make_dryrun); then :; else \ st=0; \ errmsg="fatal: making $(INTEGRATION_TEST_SUITE_LOG): failed to create"; \ for i in $$redo_bases; do \ test -f $$i.trs && test -r $$i.trs \ || { echo "$$errmsg $$i.trs" >&2; st=1; }; \ test -f $$i.log && test -r $$i.log \ || { echo "$$errmsg $$i.log" >&2; st=1; }; \ done; \ test $$st -eq 0 || exit 1; \ fi @$(am__sh_e_setup); $(am__tty_colors); $(am__set_INTEGRATION_TESTS_bases); \ ws='[ ]'; \ results=`for b in $$bases; do echo $$b.trs; done`; \ test -n "$$results" || results=/dev/null; \ all=` grep "^$$ws*:test-result:" $$results | wc -l`; \ pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \ fail=` grep "^$$ws*:test-result:$$ws*FAIL" $$results | wc -l`; \ skip=` grep "^$$ws*:test-result:$$ws*SKIP" $$results | wc -l`; \ xfail=`grep "^$$ws*:test-result:$$ws*XFAIL" $$results | wc -l`; \ xpass=`grep "^$$ws*:test-result:$$ws*XPASS" $$results | wc -l`; \ error=`grep "^$$ws*:test-result:$$ws*ERROR" $$results | wc -l`; \ if test `expr $$fail + $$xpass + $$error` -eq 0; then \ success=true; \ else \ success=false; \ fi; \ br='==================='; br=$$br$$br$$br$$br; \ result_count () \ { \ if test x"$$1" = x"--maybe-color"; then \ maybe_colorize=yes; \ elif test x"$$1" = x"--no-color"; then \ maybe_colorize=no; \ else \ echo "$@: invalid 'result_count' usage" >&2; exit 4; \ fi; \ shift; \ desc=$$1 count=$$2; \ if test $$maybe_colorize = yes && test $$count -gt 0; then \ color_start=$$3 color_end=$$std; \ else \ color_start= color_end=; \ fi; \ echo "$${color_start}# $$desc $$count$${color_end}"; \ }; \ create_testsuite_report () \ { \ result_count $$1 "TOTAL:" $$all "$$brg"; \ result_count $$1 "PASS: " $$pass "$$grn"; \ result_count $$1 "SKIP: " $$skip "$$blu"; \ result_count $$1 "XFAIL:" $$xfail "$$lgn"; \ result_count $$1 "FAIL: " $$fail "$$red"; \ result_count $$1 "XPASS:" $$xpass "$$red"; \ result_count $$1 "ERROR:" $$error "$$mgn"; \ }; \ { \ echo "$(PACKAGE_STRING): $(subdir)/$(INTEGRATION_TEST_SUITE_LOG)" | \ $(am__rst_title); \ create_testsuite_report --no-color; \ echo; \ echo ".. contents:: :depth: 2"; \ echo; \ for b in $$bases; do echo $$b; done \ | $(am__create_global_log); \ } >$(INTEGRATION_TEST_SUITE_LOG).tmp || exit 1; \ mv $(INTEGRATION_TEST_SUITE_LOG).tmp $(INTEGRATION_TEST_SUITE_LOG); \ if $$success; then \ col="$$grn"; \ else \ col="$$red"; \ test x"$$VERBOSE" = x || cat $(INTEGRATION_TEST_SUITE_LOG); \ fi; \ echo "$${col}$$br$${std}"; \ echo "$${col}Integration test-suite summary for $(PACKAGE_STRING)$${std}"; \ echo "$${col}$$br$${std}"; \ create_testsuite_report --maybe-color; \ echo "$$col$$br$$std"; \ if $$success; then :; else \ echo "$${col}See $(subdir)/$(INTEGRATION_TEST_SUITE_LOG)$${std}"; \ if test -n "$(PACKAGE_BUGREPORT)"; then \ echo "$${col}Please report to $(PACKAGE_BUGREPORT)$${std}"; \ fi; \ echo "$$col$$br$$std"; \ fi; \ $$success || exit 1 integration-TESTS: @list='$(RECHECK_LOGS)'; test -z "$$list" || rm -f $$list @list='$(RECHECK_LOGS:.log=.trs)'; test -z "$$list" || rm -f $$list @test -z "$(INTEGRATION_TEST_SUITE_LOG)" || rm -f $(INTEGRATION_TEST_SUITE_LOG) @set +e; $(am__set_INTEGRATION_TESTS_bases); \ log_list=`for i in $$bases; do echo $$i.log; done`; \ trs_list=`for i in $$bases; do echo $$i.trs; done`; \ log_list=`echo $$log_list`; trs_list=`echo $$trs_list`; \ for b in $$bases; do \ p='$$b$(EXEEXT)'; \ $(am__check_pre) $(LOG_DRIVER) --test-name "$$b" \ --log-file $$b.log --trs-file $$b.trs \ $(am__common_driver_flags) $(AM_LOG_DRIVER_FLAGS) $(LOG_DRIVER_FLAGS) -- $(LOG_COMPILE) \ "$$b" $(AM_TESTS_FD_REDIRECT); \ done; \ $(MAKE) $(AM_MAKEFLAGS) $(INTEGRATION_TEST_SUITE_LOG) TEST_LOGS="$$log_list"; \ exit $$?; integration: $(MAKE) $(AM_MAKEFLAGS) $(check_PROGRAMS) $(integration_PROGRAMS) $(MAKE) $(AM_MAKEFLAGS) integration-TESTS mostlyclean-local: -test -z "$(INTEGRATION_TEST_LOGS)" || rm -f $(INTEGRATION_TEST_LOGS) -test -z "$(INTEGRATION_TEST_LOGS:.log=.trs)" || rm -f $(INTEGRATION_TEST_LOGS:.log=.trs) -test -z "$(INTEGRATION_TEST_SUITE_LOG)" || rm -f $(INTEGRATION_TEST_SUITE_LOG)
Explain the purpose of the module 'aircrack-ng/README'. Describe how it is used in security workflows. Language: unknown.
Documentation, tutorials, ... can be found on https://www.aircrack-ng.org See also manpages and the forum (GitHub Discussions). Installing ========== This version has more dependencies/libraries required than previous versions to be compiled. See INSTALLING file for more information OpenWrt Devices =============== You can use airodump-ng on OpenWrt devices. You'll have to use specify prism0 as interface. Airodump-ng will automatically create it. Rq: Aireplay DOESN'T work on OpenWrt (2.4 kernel) with broadcom chipset since the driver doesn't support injection. It *may* work with 2.6 kernels >= 2.6.24 (kamikaze 8.09+ custom-built). Known bugs: =========== Drivers ------- Madwifi-ng ---------- The cause of most of these problems (1, 2 and 3) is that Madwifi-ng cannot easily change the rate in monitor mode. Technically, when changing rate while in monitor mode, the raw socket gets invalidated and we have to get it again. Madwifi-ng is getting replaced by several drivers: ath5k, ath9k and ar9170. Problem 1: No client can associate to an airbase soft AP. Solution: Use a more recent driver. Madwifi-ng has been deprecated for years. Problem 2: When changing rate while you are capturing packet makes airodump-ng stall Solution 2: Restart airodump-ng or change rate before starting it. Problem 3: After some time it stops capturing packets and you're really sure no network manager are running at all. Solution 3: That's a known bug in the driver, it may happen at any time (the time before it fails can vary a lot: from 5 minutes to 50 or even more). Try (as root) unloading completely the driver with 'madwifi-unload' and then run 'modprobe ath_pci autocreate=monitor'. Problem 4: When creating a new VAP airodump-ng takes up to 10-15 seconds to see the first packet Solution 4: It's the behavior of madwifi-ng, don't worry (... be happy ;)). Orinoco ------- Problem: BSSID is not reported correctly or is 00:00:00:00:00:00 or signal is not reported correctly. Solution: None. Consider replacing your card, orinoco is really really old. Aircrack-ng ----------- Aireplay-ng ----------- Problem: Fakeauth on a WRT54G with WEP (shared authentication) doesn't work. Solution: None at this time (we'll try to fix it in an upcoming release). Airolib-ng ---------- Problem: On windows only, opening/creating a database doesn't work when airolib-ng is in directories containing special characters like 'ç', 'é', 'è', 'à', ... (directories containing spaces are not affected). Reason: It's a SQLite issue. Solution: Rename the directory or move the database into another directory. Airodump-ng ----------- Problem: Airodump-ng stop working after some time. Solution 1: You may have a network manager running that puts back the card in managed mode. You'll have to disable it (the fastest solution is killing the process) then restart airodump-ng. Solution 2: See Problem 3 of Madwifi-ng. Problem: On windows, it doesn't display a list of adapters like the old 0.X Solution: It requires you to develop your own DLL. Problem: Handshake is not captured/detected Reason: You might be too far and your signal is bad (or too close with a signal too strong). Another possibility is that Airodump-ng didn't detect the handshake properly due to being far apart in the capture. Solution 1: Check out our tutorial 'WPA Packet Capture Explained' in the wiki. Solution 2: Try running Aircrack-ng on your capture, it might detect the capture. Solution 3: Check out our wpaclean tool. Note: It will be fixed in an upcoming release. Cygwin ------ Problem: /usr/include/sys/reent.h:14:20: fatal error: stddef.h: No such file or directory Solution: It happens because the gcc and g++ version are different. Make sure they are the same. Sample files ============ wep.open.system.authentication.cap: It shows a connection (authentication then association) to a WEP network (open authentication). wep.shared.key.authentication.cap: It shows a connection (authentication then association to a WEP network (shared authentication). The difference with open authentication is that the client has to encrypt a challenge text and send it back (encrypted) to the AP to prove it has the right key. wpa.cap: This is a sample file with a WPA handshake. It is located in the test/ directory of the install files. The passphrase is 'biscotte'. Use the password file (password.lst) which is in the same directory. wpa2.eapol.cap: This is a sample file with a WPA2 handshake. It is located in the test/ directory of the install files. The passphrase is '12345678'. Use the password file (password.lst) which is in the same directory. test.ivs (http://download.aircrack-ng.org/wiki-files/other/test.ivs): This is a 128 bit WEP key file. The key is AE:5B:7F:3A:03:D0:AF:9B:F6:8D:A5:E2:C7. wep_64_ptw.cap (http://dl.aircrack-ng.org/ptw.cap): This is a 64 bit WEP key file suitable for the PTW method. The key is '1F:1F:1F:1F:1F'. wpa-psk-linksys.cap: This is a sample file with a WPA1 handshake along with some encrypted packets. Useful for testing with airdecap-ng. The password is 'dictionary'. wpa2-psk-linksys.cap: This is a sample file with a WPA2 handshake along with some encrypted packets. Useful for testing with airdecap-ng. The password is 'dictionary'. wps2.0.pcap: This is a test file with WPS 2.0 beacon. password.lst and password-2.lst: This is a sample wordlist for WPA key cracking. More wordlists can be found at https://www.aircrack-ng.org/doku.php?id=faq#where_can_i_find_good_wordlists password.db This is a sample airolib-ng database for WPA key cracking. pingreply.c Replies to all ping requests. Useful for testing sniffing/injecting packets with airtun-ng. Chinese-SSID-Name.pcap Contains a beacon with an SSID displayed in Chinese. verify_inject.py Testing DNS requests using airtun-ng. n-02.cap: This is a test file with 802.11X-2004 AES-128-CMAC handshake. Useful for testing with aircrack-ng. The password is 'bo$$password'. test-pmkid.pcap: This is a test file with PMKID. Passphrase for 'WLAN-771698' is 'SP-91862D361' test1.pcap: This is another test file with PMKID. Passphrase for the network 'ogogo' is '15211521' StayAlfred.hccapx: Hashcat HCCAPx file with WPA handshake. Passphrase for 'StayAlfred' ESSID is 'staytogether' wpa3-psk.pcap: WPA3 PSK SAE authentication. Passphrase for the network 'WPA3-Network' is 'abcdefgh' More sample pcap are available from Wireshark: https://wiki.wireshark.org/SampleCaptures#Wifi_.2F_Wireless_LAN_captures_.2F_802.11
Explain the purpose of the module 'aircrack-ng/README.md'. Describe how it is used in security workflows. Language: Markdown.
# Aircrack-ng ## Badges ### GitHub CI [![Alma Linux CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/almalinux.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/almalinux.yml) [![Alpine Linux](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/alpine.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/alpine.yml) [![DragonFlyBSD CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/dragonflybsd.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/dragonflybsd.yml) [![FreeBSD CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/freebsd.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/freebsd.yml) [![Kali Linux CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/kali.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/kali.yml) [![Linux CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/linux.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/linux.yml) [![Linux PCRE CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/linux-pcre.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/linux-pcre.yml) [![macOS CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/macos.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/macos.yml) [![NetBSD CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/netbsd.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/netbsd.yml) [![OpenBSD CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/openbsd.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/openbsd.yml) [![Windows CI](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/windows.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/windows.yml) ### Others [![Clang Scan-build](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/scanbuild.yml/badge.svg)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/scanbuild.yml) [![Codespell](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/codespell.yml/badge.svg)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/codespell.yml) [![Coverity Scan](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/coverity.yml/badge.svg)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/coverity.yml) [![Docker (git) push to DockerHub](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/docker.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/docker.yml) [![Markdown link](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/markdown-link.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/markdown-link.yml) [![PVS-Studio Analysis](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/pvs-studio.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/pvs-studio.yml) [![Style & Consistency](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/style.yml/badge.svg?event=push)](https://github.com/aircrack-ng/aircrack-ng/actions/workflows/style.yml) ### Repository versions ![Arch Linux package](https://img.shields.io/archlinux/v/community/x86_64/aircrack-ng) ![Debian package](https://img.shields.io/debian/v/aircrack-ng/testing?label=debian%20testing) ![Docker Image Version (latest by date)](https://img.shields.io/docker/v/aircrackng/git?color=blue&label=Docker%20Tag%20%7C%20git) ![Fedora package](https://img.shields.io/fedora/v/aircrack-ng) ![homebrew version](https://img.shields.io/homebrew/v/aircrack-ng) ![Ubuntu package](https://img.shields.io/ubuntu/v/aircrack-ng/bionic?label=Ubuntu%2018.04) ![Ubuntu package](https://img.shields.io/ubuntu/v/aircrack-ng/focal?label=Ubuntu%2020.04) ![Ubuntu package](https://img.shields.io/ubuntu/v/aircrack-ng/jammy?label=Ubuntu%2022.04) ![Ubuntu package](https://img.shields.io/ubuntu/v/aircrack-ng/kinetic?label=Ubuntu%2022.10) ![Ubuntu package](https://img.shields.io/ubuntu/v/aircrack-ng/lunar?label=Ubuntu%2023.04) ## Description Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: * Monitoring: Packet capture and export of data to text files for further processing by third party tools. * Attacking: Replay attacks, deauthentication, fake access points and others via packet injection. * Testing: Checking WiFi cards and driver capabilities (capture and injection). * Cracking: WEP and WPA PSK (WPA 1 and 2). All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily on Linux but also Windows, macOS, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2. # Building ## Requirements * Autoconf * Automake * Libtool * shtool * OpenSSL development package or libgcrypt development package. * Airmon-ng (Linux) requires ethtool, usbutils, and often pciutils. * On Windows, cygwin has to be used and it also requires w32api package. * On Windows, if using clang, libiconv and libiconv-devel * Linux: LibNetlink 1 or 3. It can be disabled by passing --disable-libnl to configure. * pkg-config (pkgconf on FreeBSD, DragonFlyBSD, OpenBSD and NetBSD) * FreeBSD, DragonFlyBSD, OpenBSD, NetBSD, Solaris and OS X with Macports: gmake * Linux/Cygwin: make and Standard C++ Library development package (Debian: libstdc++-dev) Note: Airmon-ng only requires pciutils if the system has a PCI/PCIe bus and it is populated. Such bus can be present even if not physically visible. For example, it is present, and populated on the Raspberry Pi 4, therefore pciutils is required on that device. ## Optional stuff * If you want SSID filtering with regular expression in airodump-ng (--essid-regex) PCRE or PCRE2 development package is required. * If you want to use airolib-ng and '-r' option in aircrack-ng, SQLite development package >= 3.3.17 (3.6.X version or better is recommended) * If you want to use Airpcap, the 'developer' directory from the CD/ISO/SDK is required. * In order to build `besside-ng`, `besside-ng-crawler`, `easside-ng`, `tkiptun-ng` and `wesside-ng`, libpcap development package is required (on Cygwin, use the Airpcap SDK instead; see above) * rfkill * If you want Airodump-ng to log GPS coordinates, gpsd is needed * For best performance on SMP machines, ensure the hwloc library and headers are installed. It is strongly recommended on high core count systems, it may give a serious speed boost * CMocka and expect for testing * For integration testing on Linux only: tcpdump, HostAPd, WPA Supplicant and screen ## Installing required and optional dependencies Below are instructions for installing the basic requirements to build `aircrack-ng` for a number of operating systems. **Note**: CMocka, tcpdump, screen, HostAPd and WPA Supplicant should not be dependencies when packaging Aircrack-ng. ### Linux #### Arch Linux sudo pacman -Sy base-devel libnl openssl ethtool util-linux zlib libpcap sqlite pcre2 hwloc cmocka hostapd wpa_supplicant tcpdump screen iw usbutils pciutils expect #### Debian/Ubuntu sudo apt-get install build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre2-dev libhwloc-dev libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils expect #### Fedora sudo yum install libtool pkgconfig sqlite-devel autoconf automake openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel expect #### CentOS/RHEL 7 sudo yum install epel-release sudo ./centos_autotools.sh # Remove older installation of automake/autoconf sudo yum remove autoconf automake sudo yum install sqlite-devel openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel **Note**: autoconf, automake, libtool, and pkgconfig in the repositories are too old. The script centos_autotools.sh automatically installs dependencies to compile then install the tools. #### CentOS/RHEL 8 sudo yum config-manager --set-enabled powertools sudo yum install epel-release sudo yum install libtool pkgconfig sqlite-devel autoconf automake openssl-devel libpcap-devel pcre2-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel libcmocka-devel make file expect hostapd wpa_supplicant iw usbutils tcpdump screen zlib-devel #### openSUSE sudo zypper install autoconf automake libtool pkg-config libnl3-devel libopenssl-1_1-devel zlib-devel libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc ethtool pciutils usbutils expect #### Mageia sudo urpmi autoconf automake libtool pkgconfig libnl3-devel libopenssl-devel zlib-devel libpcap-devel sqlite3-devel pcre2-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc make expect #### Alpine sudo apk add gcc g++ make autoconf automake libtool libnl3-dev openssl-dev ethtool libpcap-dev cmocka-dev hostapd wpa_supplicant tcpdump screen iw pkgconf util-linux sqlite-dev pcre2-dev linux-headers zlib-dev pciutils usbutils expect **Note**: Community repository needs to be enabled for iw #### Clear Linux sudo swupd bundle-add c-basic devpkg-openssl devpkg-libgcrypt devpkg-libnl devpkg-hwloc devpkg-libpcap devpkg-pcre2 devpkg-sqlite-autoconf ethtool wget network-basic software-testing sysadmin-basic wpa_supplicant os-testsuite **Note**: hostapd must be compiled manually, it is not present in the repository ### BSD #### FreeBSD pkg install pkgconf shtool libtool gcc9 automake autoconf pcre2 sqlite3 openssl gmake hwloc cmocka #### DragonflyBSD pkg install pkgconf shtool libtool gcc8 automake autoconf pcre2 sqlite3 libgcrypt gmake cmocka #### OpenBSD pkg_add pkgconf shtool libtool gcc automake autoconf pcre2 sqlite3 openssl gmake cmocka #### NetBSD pkg_add pkgconf libtool gcc7 automake autoconf pcre2 sqlite3 openssl gmake cmocka ### macOS XCode, Xcode command line tools and HomeBrew are required. brew install autoconf automake libtool openssl shtool pkg-config hwloc pcre2 sqlite3 libpcap cmocka ### Windows #### Cygwin Cygwin requires the full path to the `setup.exe` utility, in order to automate the installation of the necessary packages. In addition, it requires the location of your installation, a path to the cached packages download location, and a mirror URL. An example of automatically installing all the dependencies is as follows: c:\cygwin\setup-x86.exe -qnNdO -R C:/cygwin -s http://cygwin.mirror.constant.com -l C:/cygwin/var/cache/setup -P autoconf -P automake -P bison -P gcc-core -P gcc-g++ -P mingw-runtime -P mingw-binutils -P mingw-gcc-core -P mingw-gcc-g++ -P mingw-pthreads -P mingw-w32api -P libtool -P make -P python -P gettext-devel -P gettext -P intltool -P libiconv -P pkg-config -P git -P wget -P curl -P libpcre2-devel -P libssl-devel -P libsqlite3-devel #### MSYS2 pacman -Sy autoconf automake-wrapper libtool msys2-w32api-headers msys2-w32api-runtime gcc pkg-config git python openssl-devel openssl libopenssl msys2-runtime-devel gcc binutils make pcre2-devel libsqlite-devel ## Docker containers We have two repositories on DockerHub: - [aircrackng/release](https://hub.docker.com/r/aircrackng/release): Each release - [aircrackng/git](https://hub.docker.com/r/aircrackng/git): every commit in the git repository Base command for the `git` version: `sudo docker run --rm -it aircrackng/git` Available platforms/CPU architectures: - linux/386 (base image: debian:unstable-slim) - linux/amd64 (base image: debian:unstable-slim) - linux/arm/v5 (base image: debian:unstable-slim) - linux/arm/v6 (base image: alpine:3) - linux/arm/v7 (base image: debian:unstable-slim) - linux/arm64/v8 (base image: debian:unstable-slim) - linux/mips64le (base image: debian:unstable-slim) - linux/ppc64le (base image: debian:unstable-slim) - linux/riscv64 (base image: debian:unstable-slim) - linux/s390x (base image: debian:unstable-slim) ## Compiling To build `aircrack-ng`, the Autotools build system is utilized. Autotools replaces the older method of compilation. **NOTE**: If utilizing a developer version, eg: one checked out from source control, you will need to run a pre-`configure` script. The script to use is one of the following: `autoreconf -i` or `env NOCONFIGURE=1 ./autogen.sh`. First, `./configure` the project for building with the appropriate options specified for your environment: ./configure <options> **TIP**: If the above fails, please see above about developer source control versions. Next, compile the project (respecting if `make` or `gmake` is needed): * Compilation: `make` * Compilation on *BSD or Solaris: `gmake` Finally, the additional targets listed below may be of use in your environment: * Execute all unit testing: `make check` * Execute all integration testing (requires root): `make integration` * Installing: `make install` * Uninstall: `make uninstall` ### `./configure` flags When configuring, the following flags can be used and combined to adjust the suite to your choosing: * **with-airpcap=DIR**: needed for supporting airpcap devices on Windows (Cygwin or MSYS2 only). Replace DIR above with the absolute location to the root of the extracted source code from the Airpcap CD or downloaded SDK available online. Required on Windows to build `besside-ng`, `besside-ng-crawler`, `easside-ng`, `tkiptun-ng` and `wesside-ng` when building experimental tools. The developer pack (Compatible with version 4.1.1 and 4.1.3) can be downloaded at https://support.riverbed.com/content/support/software/steelcentral-npm/airpcap.html * **with-experimental**: needed to compile `tkiptun-ng`, `easside-ng`, `buddy-ng`, `buddy-ng-crawler`, `airventriloquist` and `wesside-ng`. libpcap development package is also required to compile most of the tools. If not present, not all experimental tools will be built. On Cygwin, libpcap is not present and the Airpcap SDK replaces it. See --with-airpcap option above. * **with-ext-scripts**: needed to build `airoscript-ng`, `versuck-ng`, `airgraph-ng` and `airdrop-ng`. Note: Each script has its own dependencies. * **with-gcrypt**: Use libgcrypt crypto library instead of the default OpenSSL. And also use internal fast sha1 implementation (borrowed from GIT). Dependency (Debian): libgcrypt20-dev * **with-duma**: Compile with DUMA support. DUMA is a library to detect buffer overruns and underruns. Dependency (Debian): duma * **disable-libnl**: Set up the project to be compiled without libnl (1 or 3). Linux option only. * **without-opt**: Do not enable -O3 optimizations. * **enable-shared**: Make OSdep a shared library. * **disable-shared**: When combined with **enable-static**, it will statically compile Aircrack-ng. * **with-avx512**: On x86, add support for AVX512 instructions in aircrack-ng. Only use it when the current CPU supports AVX512. * **with-static-simd=<SIMD>**: Compile a single optimization in aircrack-ng binary. Useful when compiling statically and/or for space-constrained devices. Valid SIMD options: x86-sse2, x86-avx, x86-avx2, x86-avx512, ppc-altivec, ppc-power8, arm-neon, arm-asimd. Must be used with --enable-static --disable-shared. When using those 2 options, the default is to compile the generic optimization in the binary. --with-static-simd merely allows to choose another one. * **enable-maintainer-mode**: It is important to enable this flag when developing with Aircrack-ng. This flag enables additional compile warnings and safety features. #### Examples: * Configure and compiling: ``` ./configure --with-experimental make ``` * Compiling with gcrypt: ``` ./configure --with-gcrypt make ``` * Installing: `make install` * Installing (strip binaries): `make install-strip` * Installing, with external scripts: ``` ./configure --with-experimental --with-ext-scripts make make install ``` * Testing (with sqlite, experimental and pcre2) ``` ./configure --with-experimental make make check ``` * Compiling on OS X with macports (and all options): ``` ./configure --with-experimental gmake ``` * Compiling on macOS running on M1/AARCH64 and Homebrew: ``` autoreconf -vif env CPPFLAGS="-Wno-deprecated-declarations" ./configure --with-experimental make make check ``` * Compiling on OS X 10.10 with XCode 7.1 and Homebrew: ``` env CC=gcc-4.9 CXX=g++-4.9 ./configure make make check ``` *NOTE*: Older XCode ships with a version of LLVM that does not support CPU feature detection; which causes the `./configure` to fail. To work around this older LLVM, it is required that a different compile suite is used, such as GCC or a newer LLVM from Homebrew. If you wish to use OpenSSL from Homebrew, you may need to specify the location to its installation. To figure out where OpenSSL lives, run: `brew --prefix openssl` Use the output above as the DIR for `--with-openssl=DIR` in the `./configure` line: ``` env CC=gcc-4.9 CXX=g++-4.9 ./configure --with-openssl=DIR make make check ``` * Compiling on FreeBSD with gcc9 ``` env CC=gcc9 CXX=g++9 MAKE=gmake ./configure gmake ``` * Compiling on Cygwin with Airpcap (assuming Airpcap devpack is unpacked in Aircrack-ng directory) ``` cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-osdep cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-crypto cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-util dlltool -D Airpcap_Devpack/bin/x86/airpcap.dll -d build/airpcap.dll.def -l Airpcap_Devpack/bin/x86/libairpcap.dll.a autoreconf -i ./configure --with-experimental --with-airpcap=$(pwd) make ``` * Compiling on DragonflyBSD with gcrypt using GCC 8 ``` autoreconf -i env CC=gcc8 CXX=g++8 MAKE=gmake ./configure --with-experimental --with-gcrypt gmake ``` * Compiling on OpenBSD (with autoconf 2.69 and automake 1.16) ``` export AUTOCONF_VERSION=2.69 export AUTOMAKE_VERSION=1.16 autoreconf -i env MAKE=gmake CC=cc CXX=c++ ./configure gmake ``` * Compiling and debugging aircrack-ng ``` export CFLAGS='-O0 -g' export CXXFLAGS='-O0 -g' ./configure --with-experimental --enable-maintainer-mode --without-opt make LD_LIBRARY_PATH=.libs gdb --args ./aircrack-ng [PARAMETERS] ``` # IDE development ## VS Code - devcontainers A VS Code development environment is provided, as is, for rapid setup of a development environment. This additionally adds support for GitHub Codespaces. ### Requirements The first requirement is a working [Docker Engine](https://docs.docker.com/engine/install/) environment. Next, an installation of [VS Code](https://code.visualstudio.com/) with the following extension(s): - [`Remote - Containers`](https://marketplace.visualstudio.com/items?itemName=ms-vscode-remote.remote-containers) by Microsoft. > The "Remote - Containers" extension will refuse to work with OSS Code. ### Usage 1. Clone this repository to your working folder: ``` $ git clone --recursive https://github.com/aircrack-ng/aircrack-ng.git $ cd aircrack-ng ``` 2. After cloning this repository, open the folder inside VS Code. ``` $ code . ``` > IMPORTANT: You should answer "Yes", if it asks if the folder should be opened inside a remote container. If it does not ask, then press `Ctrl+Shift+P` and type `open in container`. This should bring up the correct command, for which pressing enter will run said command. 3. A number of warnings might appear about a missing `compile_commands.json` file. These are safe to ignore for a moment, as this file is automatically generated after the initial compilation. 4. Now build the entire project by pressing `Ctrl+R` and selecting `Build Full` from the pop-up menu that appears. 5. VS Code should detect the `compile_commands.json` file and ask if it should be used; selecting "Yes, always" will complete the initial setup of a fully working IDE. > IMPORTANT: If it doesn't detect the file, pressing `Ctrl+Shift+P` and typing `reload window` will bring up the selection to fully reload the environment. 6. At this point, nearly all features of VS Code will function; from Intellisense, auto-completion, live documentation, to code formatting. Additionally, there are pre-configured tasks for builds and tests, as well as an example GDB/LLDB configuration for debugging `aircrack-ng`. # Packaging Automatic detection of CPU optimization is done at run time. This behavior **is** desirable when packaging Aircrack-ng (for a Linux or other distribution.) Also, in some cases it may be desired to provide your own flags completely and not having the suite auto-detect a number of optimizations. To do this, add the additional flag `--without-opt` to the `./configure` line: `./configure --without-opt` # Using pre-compiled binaries ## Linux/BSD Aircrack-ng is available in most distributions repositories. However, it is not always up-to-date. ## Windows * Install the appropriate "monitor" driver for your card; standard drivers don't work for capturing data. * Aircrack-ng suite is command line tools. So, you have to open a command-line `Start menu -> Run... -> cmd.exe` then use them * Run the executables without any parameters to have help # Documentation Some more information is present in the [README](README) file. Documentation, tutorials, ... can be found on https://aircrack-ng.org Support is available in the [GitHub Discussions](https://github.com/aircrack-ng/aircrack-ng/discussions) and on IRC (in #aircrack-ng on Libera Chat). Every tool has its own manpage. For aircrack-ng, `man aircrack-ng` # Infrastructure sponsors
Explain the purpose of the module 'aircrack-ng/SECURITY.md'. Describe how it is used in security workflows. Language: Markdown.
# Security Policy Although we do our best to prevent vulnerabilities, and have tools to help catch most of them, we are humans after all, and there will be inevitably issues slipping through the cracks. They can fall into two categories, either in any of the tools in the Aircrack-ng suite, or in our presence online (website, forum, emails, DNS, etc.). Depending on which category they fall into, different information is needed. We do believe in coordinated disclosure, so in order to address them, and coordinate disclosure with you (and properly credit you for the discovery), report them to us. Do not open bug reports or pull requests. Our contact email for security issues is security@aircrack-ng.org If you are unsure how to proceed, need clarifications or have questions or remarks about this policy, feel free to email us to inquire. ## Aircrack-ng suite vulnerabilities ### Supported versions We only support the latest stable present on https://aircrack-ng.org For security issues present in our GitHub repository (master or any recently active branch), open a pull request or bug report. For any security issue affecting older versions of Aircrack-ng still present in currently supported Linux or BSD distributions, file a report with them, and email us a short description of the vulnerability along with a link to the bug report. ### Reporting There is no particular template to report the vulnerabilities. Keep in mind that a vulnerability is essentially a bug, so please provide us detailed information on how to reproduce it, such as: - Which Aircrack-ng tools are affected? And how? Any proof of concept to demonstrate it? - Operating systems involved, kernel versions (`uname -a` and `lsb_release -a` for example). - CPU architecture (`aircrack-ng -u` output is useful); a vulnerability on a x86 32 bit may not be exploitable on ARM 64 bit. A bug may also only be present when Aircrack-ng is compiled a certain way. - All the commands needed to trigger the issue. - Did you compile it yourself or did you get it from a package? - What equipment did you use? A packet capture may be useful; different equipment behaves differently, they have different Wi-Fi stacks, drivers, and firmwares. - A patch to fix the issue, if available. - If CVE numbers have been assigned, please provide them as well. ### Public disclosure Although it is essentially a bug, do not submit a bug report or a pull request, but email us the data first, so we can coordinate fixing the issue and assist you in filing the bug reports, and if you provided a patch, the pull request; a patch may need to be broken down in multiple commits for clarity, for example. ## Online presence For any security issue affecting us specifically (any aircrack-ng.org subdomain) such as misconfiguration of our hosting, DNS, email, servers, or misconfiguration of the software we are using, email us with all the details regarding your findings. Anything else should be reported to the author or provider of the software, hardware, or hosting.
Explain the purpose of the module 'aircrack-ng/.devcontainer/devcontainer.json'. Describe how it is used in security workflows. Language: JSON.
// For format details, see https://aka.ms/devcontainer.json. For config options, see the README at: // https://github.com/microsoft/vscode-dev-containers/tree/v0.154.2/containers/cpp { "name": "Aircrack-ng", "build": { "dockerfile": "Dockerfile", // Update 'VARIANT' to pick an Debian / Ubuntu OS version: debian-10, debian-9, ubuntu-20.04, ubuntu-18.04 "args": { "VARIANT": "ubuntu-22.04" } }, "runArgs": [ "--cap-add=SYS_PTRACE", "--security-opt", "seccomp=unconfined" ], // Configure tool-specific properties. "customizations": { // Configure properties specific to VS Code. "vscode": { // Set *default* container specific settings.json values on container create. "settings": { "terminal.integrated.defaultProfile.linux": "bash", "editor.formatOnSave": true, "clang-format.executable": "/usr/local/bin/clang-format", "clang-format.fallbackStyle": "none", "clang-format.assumeFilename": "${file}", "clang-format.style": "file", "editor.defaultFormatter": "llvm-vs-code-extensions.vscode-clangd", "clangd.path": "/usr/bin/clangd-14", "C_Cpp.clang_format_fallbackStyle": "none", "C_Cpp.clang_format_path": "/usr/local/bin/clang-format", "C_Cpp.clang_format_style": "file", "C_Cpp.formatting": "clangFormat" }, // Add the IDs of extensions you want installed when the container is created. "extensions": [ "ms-vscode.cpptools", "xaver.clang-format", "llvm-vs-code-extensions.vscode-clangd" ] } }, // Use 'forwardPorts' to make a list of ports inside the container available locally. // "forwardPorts": [], // Use 'postCreateCommand' to run commands after the container is created. "postCreateCommand": "pre-commit install --install-hooks", // Comment out to connect as root instead. More info: https://aka.ms/vscode-remote/containers/non-root. "remoteUser": "vscode" }
Explain the purpose of the module 'aircrack-ng/.devcontainer/Dockerfile'. Describe how it is used in security workflows. Language: unknown.
# See here for image contents: https://github.com/microsoft/vscode-dev-containers/tree/v0.154.2/containers/cpp/.devcontainer/base.Dockerfile # [Choice] Debian / Ubuntu version: debian-10, debian-9, ubuntu-20.04, ubuntu-18.04 ARG VARIANT FROM mcr.microsoft.com/vscode/devcontainers/cpp:0-${VARIANT} # hadolint ignore=DL3003,DL3008 RUN apt-get update \ && export DEBIAN_FRONTEND=noninteractive \ && apt-get -y install --no-install-recommends \ build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev \ ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre2-dev libhwloc-dev \ libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils expect gawk bear \ libtinfo5 \ clangd-14 \ clang-format-14 \ python3-pip \ && rm -rf /var/lib/apt/lists/* \ && /usr/bin/pip3 install pre-commit
Explain the purpose of the module 'aircrack-ng/.github/ISSUE_TEMPLATE/bug_report.md'. Describe how it is used in security workflows. Language: Markdown.
--- name: Bug report about: Used to report a defect in the source code, scripts, website, documentation, etc... Post questions in the GitHub Discussions tab - Read our documentation at https://aircrack-ng.org --- <!-- **Bug reports will only be accepted against the current tip of the master git branch. Anything else will be rejected. Questions must be posted in the discussion board at <https://github.com/aircrack-ng/aircrack-ng/discussions>.** For any security-related issues such as exploits, buffer overflows, and such, refer to our security policy: <https://github.com/aircrack-ng/aircrack-ng/security/policy> Please read the following before reporting the issue: - Use the search function to check if the bug you're about to post isn't a duplicate. If an existing bug is open and you have new information, update it. If a bug exists and is closed, reopen it and add useful information to it. - Unless bugs are linked, one bug per ticket. - Don't worry about any of the items on the right panel (Assignee, Labels or Milestone), we will take care of them. The following must be taken to the GitHub Discussions first, as in these cases, it often turns out to be a technique issue or the issue is out of our control: - Not receiving any packets with airodump-ng or any other tool. - Can't crack a network. - Wireless card doesn't work. - Channel -1. Make sure to check our documentation at <https://aircrack-ng.org/doku.php> as well as our fairly comprehensive FAQ at <https://aircrack-ng.org/doku.php?id=faq>. **REMOVE ALL OF THE ABOVE TEXT** --> # Defect Report ## Issue type <!-- Please select from one of the following software defect descriptions. Pick the one(s) that best reflects the issue you are experiencing. Erase the others. --> - [ ] Defect - Compilation or `make check` issue - Attach `config.log` and provide relevant system information such as `lscpu` - Make sure dependencies are installed - [ ] Defect - Crash - [ ] Defect - Incorrect value displayed/received/stored - [ ] Defect - Unexpected behavior (obvious or confirmed in the GitHub Discussions) ## System information <!-- On Linux, OS version can often be found in /etc/os-release. On Debian-based you may use `lsb_release -i` for "OS Name", `lsb_release -r` for "OS version". Copy and paste the output of `uname -a` in Kernel version. CPU information can be gathered with `lscpu`, or `cat /proc/cpuinfo` Wireless card and chipset information is displayed with `airmon-ng`. If it doesn't display anything, add information from `lspci`, `lsusb`, and `sudo lshw -c network -sanitize`. The wireless adapter can also be found in dmesg. --> - OS Name: - OS Version: - Kernel version: - CPU: - Wireless card and chipset (if relevant): ## Aircrack-ng version <!-- For the aircrack-ng version, run `aircrack-ng | head`, it will be displayed right after 'Aircrack-ng'. When compiled from git, the short SHAsum (7 characters long) will be shown right after the version number. Don't say 'Latest' for the version, this is not helpful as it changes over time. --> - Version: - Commit Revision hash: ## Airmon-ng debug information <!-- If the issue is related to packet capture or injection, run `airmon-ng --debug` and post the output here. Please make sure to enclose with backticks for readability. --> ## Defect ### Details <!-- Summarize the issue in a paragraph or two. If you need to provide output of the different tools, or commands, file content, etc, use the backticks to enclose the text. Only post pictures if the issues when it cannot be avoided. --> ### How to reproduce the issue <!-- A clear and concise list of steps describing how to reproduce the issue, relevant commands and errors/outputs. Such as: What command(s) did you run? What was displayed/happened? What did you expect to happen or be displayed? Do not use pastebin-type links as they expire, rendering the bug report unactionable. Avoid using images whenever possible. If the content (output or error) is text and can be copy/pasted, enclose it with backticks for readability. If it is large, put it in a file and attach it to the ticket. GitHub markdown guide: https://guides.github.com/features/mastering-markdown/ Last, but not least, if you aren't familiar with bug reporting, [this](https://www.chiark.greenend.org.uk/~sgtatham/bugs.html) is an excellent read to help you describe bugs accurately. --> ## Related issues <!-- Link to any related issue from within the project or outside. Such as GitHub, other bug trackers, relevant GitHub Discussion post, relevant documentation. -->
Explain the purpose of the module 'aircrack-ng/.github/ISSUE_TEMPLATE/config.yml'. Describe how it is used in security workflows. Language: YAML.
blank_issues_enabled: false contact_links: - name: Website url: https://aircrack-ng.org - name: Support url: https://github.com/aircrack-ng/aircrack-ng/discussions about: We provide support in Discussion section. - name: Documentation url: https://aircrack-ng.org/doku.php about: Comprehensive documentation (for each tool, as well as tutorials, and other resources) - name: Frequently Asked Questions url: https://aircrack-ng.org/doku.php?id=faq - name: GitHub Markdown guide url: https://guides.github.com/features/mastering-markdown/ about: Proper formatting is important to distinguish the explanation in the bug report from the commands and their output - name: How to Report Bugs Effectively url: https://www.chiark.greenend.org.uk/~sgtatham/bugs.html about: By Simon Tatham
Explain the purpose of the module 'aircrack-ng/.github/ISSUE_TEMPLATE/feature_request.md'. Describe how it is used in security workflows. Language: Markdown.
--- name: Feature request about: Suggest an idea for this project --- Please read the following: - Always test with current git master before opening a feature request - Use the search function to see if the feature you're about to request isn't a duplicate. If an existing issue is open and you have new information, update it - One feature/topic request per ticket - Don't worry about any of the items on the right panel (Assignee, Labels or Milestone), we will take care of them **REMOVE ALL OF THE ABOVE TEXT** # Description Describe the feature/topic. Even though the following is more geared toward bug reporting, it is an excellent read to provide useful details: https://www.chiark.greenend.org.uk/~sgtatham/bugs.html If output/file content is relevant, add an example enclosed in backticks. GitHub markdown guide: https://guides.github.com/features/mastering-markdown/
Explain the purpose of the module 'aircrack-ng/.github/workflows/almalinux.yml'. Describe how it is used in security workflows. Language: YAML.
name: Alma Linux CI on: push: branches: - 'master' paths-ignore: - '.devcontainer/**' - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/alpine.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/dragonflybsd.yml' - '.github/workflows/freebsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/kali.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - 'apparmor/**' - 'contrib/**' - 'manpages/**' - 'patches/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AUTHORS' - 'ChangeLog' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'centos_autotools.sh' - 'scripts/airmon-ng.freebsd' pull_request: branches: [ master ] paths-ignore: - '.devcontainer/**' - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/alpine.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/dragonflybsd.yml' - '.github/workflows/freebsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - 'apparmor/**' - 'contrib/**' - 'manpages/**' - 'patches/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AUTHORS' - 'ChangeLog' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'centos_autotools.sh' - 'scripts/airmon-ng.freebsd' jobs: lint: runs-on: ubuntu-22.04 steps: - name: Git Checkout uses: actions/checkout@v3 - name: Lint Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: Dockerfile verbose: true failure-threshold: error - name: Lint Release Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: './Dockerfile.release' verbose: true failure-threshold: error - name: Shellcheck package install script uses: sudo-bot/action-shellcheck@latest with: cli-args: "docker_package_install.sh" alma: runs-on: ubuntu-22.04 needs: lint steps: - name: Set up QEMU uses: docker/setup-qemu-action@v2 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v2 - name: Build on linux/amd64 uses: docker/build-push-action@v3 with: platforms: linux/amd64 build-args: IMAGE_BASE=almalinux:9 push: false
Explain the purpose of the module 'aircrack-ng/.github/workflows/alpine.yml'. Describe how it is used in security workflows. Language: YAML.
name: Alpine Linux CI on: push: branches: - 'master' paths-ignore: - '.devcontainer/**' - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/almalinux.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/dragonflybsd.yml' - '.github/workflows/freebsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/kali.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - 'apparmor/**' - 'contrib/**' - 'manpages/**' - 'patches/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AUTHORS' - 'ChangeLog' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'centos_autotools.sh' - 'scripts/airmon-ng.freebsd' pull_request: branches: - 'master' paths-ignore: - '.devcontainer/**' - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/almalinux.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/dragonflybsd.yml' - '.github/workflows/freebsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/kali.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - 'apparmor/**' - 'contrib/**' - 'manpages/**' - 'patches/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AUTHORS' - 'ChangeLog' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'centos_autotools.sh' - 'scripts/airmon-ng.freebsd' jobs: lint: runs-on: ubuntu-22.04 steps: - name: Git Checkout uses: actions/checkout@v3 - name: Lint Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: Dockerfile verbose: true failure-threshold: error - name: Lint Release Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: './Dockerfile.release' verbose: true failure-threshold: error - name: Shellcheck package install script uses: sudo-bot/action-shellcheck@latest with: cli-args: "docker_package_install.sh" alpine: runs-on: ubuntu-22.04 needs: lint steps: - name: Set up QEMU uses: docker/setup-qemu-action@v2 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v2 - name: Build on linux/amd64 and linux/386 uses: docker/build-push-action@v3 with: platforms: linux/amd64, linux/386 build-args: IMAGE_BASE=alpine:3 push: false
Explain the purpose of the module 'aircrack-ng/.github/workflows/check-release-ready.yml'. Describe how it is used in security workflows. Language: YAML.
name: Release readiness on: push: branches: [ master ] paths: - '.github/workflows/check-release-ready.yml' pull_request: branches: [ master ] paths: - '.github/workflows/check-release-ready.yml' workflow_dispatch: jobs: release-ready: runs-on: ubuntu-22.04 steps: - name: Git Checkout uses: actions/checkout@v3 - name: Get last git tag id: git run: | CUR_TAG=$(git ls-remote --tags https://github.com/aircrack-ng/aircrack-ng | awk -F/ '{print $3}' | grep -E '^[0-9]\.' | sort -V | tail -n 1) echo "LAST=${CUR_TAG}" >> $GITHUB_OUTPUT echo "Tag: ${CUR_TAG} - Date: ${TAG_DATE}" - name: Get Changelog information id: changelog run: | LAST_VER=$(head -n 1 ChangeLog | awk '{print $2}') echo "LAST_VER=${LAST_VER}" >> $GITHUB_OUTPUT CHANGES_FROM=$(head -n 1 ChangeLog | awk '{print $6}' | awk -F\) '{print $1}') echo "CHANGES_FROM=${CHANGES_FROM}" >> $GITHUB_OUTPUT REL_DATE=$(head -n 1 ChangeLog | awk '{print $9 " " $10 " " $11}' | sed 's/.$//') echo "REL_DATE=${REL_DATE}" >> $GITHUB_OUTPUT ENTRIES=0 [ -n "$(head -n 2 ChangeLog | tail -n 1 | grep -E '^* ')" ] && ENTRIES=1 echo "ENTRIES=${ENTRIES}" >> $GITHUB_OUTPUT echo "Last: ${LAST_VER} - From: ${CHANGES_FROM} - Date: ${REL_DATE} - Entries present:${ENTRIES}" - name: Get info from configure id: configure run: | VERSION_MAJOR=$(grep 'm4_define(\[version_major\],' configure.ac | awk '{print $2}' | awk -F\) '{print $1}') VERSION_MINOR=$(grep 'm4_define(\[version_minor\],' configure.ac | awk '{print $2}' | awk -F\) '{print $1}') VERSION_MICRO=$(grep 'm4_define(\[version_micro\],' configure.ac | awk '{print $2}' | awk -F\) '{print $1}') if [ "${VERSION_MICRO}" -gt 0 ]; then echo "VERSION=${VERSION_MAJOR}.${VERSION_MINOR}.${VERSION_MICRO}" >> $GITHUB_OUTPUT else echo "VERSION=${VERSION_MAJOR}.${VERSION_MINOR}" >> $GITHUB_OUTPUT fi VERSION_DATE=$(grep 'm4_define(\[version_date\],' configure.ac | awk -F\" '{print $2}') echo "VERSION_DATE=${VERSION_DATE}" >> $GITHUB_OUTPUT echo "Version: ${VERSION_MAJOR}.${VERSION_MINOR}.${VERSION_MICRO} - Date: ${VERSION_DATE}" - name: Get copyright dates in some tools id: copyright run: | set -e for tool in airodump-ng aircrack-ng airbase-ng aireplay-ng; do echo "Checking ${tool}" LICENSE=$(grep Copyright src/${tool}/${tool}.c | grep $(date +%Y) || true) HELP=$(grep ' - (C) ' src/${tool}/${tool}.c | grep $(date +%Y) || true) if [ -z "${LICENSE}" ] || [ -z "${HELP}" ]; then echo "${tool}=0" >> $GITHUB_OUTPUT else echo "${tool}=1" >> $GITHUB_OUTPUT fi echo "- ${tool}: ${LICENSE} --- ${HELP}" done set +e - name: Check for iw update id: iw run: | IW_URL=$(grep -E '^IW_SOURCE=' scripts/airmon-ng.linux | awk -F\" '{print $2}' | xargs dirname) wget ${IW_URL} -O index.html CUR_IW=$(grep '<a href="iw' index.html | grep 'xz' | awk -F\" '{print $2}' | sort -V | tail -n 1) AIRMON_IW=$(echo ${IW_URL} | xargs basename) if [ "${CUR_IW}" = "${AIRMON_IW}" ]; then echo "update=0" >> $GITHUB_OUTPUT else echo "update=1" >> $GITHUB_OUTPUT fi rm -f index.html - name: Check for hostapd updates id: hostapd run: | wget https://w1.fi/hostapd/ LATEST_HOSTAPD=$(grep '.tar.gz' index.html | awk -F\" '{print $2}' | xargs basename) README_HOSTAPD=$(grep -E '^tar' patches/wpe/hostapd-wpe/README.md | awk '{print $3}' | sed 's/\r//') FILE_HOSTAPD=$(ls -1 patches/wpe/hostapd-wpe/ | grep hostapd) FILE_HOSTAPD=${FILE_HOSTAPD%-wpe.patch} if [ "${LATEST_HOSTAPD}" = "${README_HOSTAPD}" ]; then echo "readme=0" >> $GITHUB_OUTPUT else echo "readme=1" >> $GITHUB_OUTPUT fi if [ "${LATEST_HOSTAPD}" = "${FILE_HOSTAPD}.tar.gz" ]; then echo "file=0" >> $GITHUB_OUTPUT else echo "file=1" >> $GITHUB_OUTPUT fi rm -f index.html - name: Check for freeradius updates id: freeradius run: | wget https://github.com/FreeRADIUS/freeradius-server/releases.atom LATEST=$(grep '<title>' releases.atom | grep -v Release | sort -V | tail -n 1 | awk -F\> '{print $2}' | awk -F\< '{print $1}') # freeradius-server-${VERSION}-wpe.diff FR_FILENAME=$(ls -1 patches/wpe/freeradius-wpe/ | grep freeradius) README=$(grep -i 'updated patch' patches/wpe/freeradius-wpe/README.md | awk '{print $5}') if [ "freeradius-server-${LATEST}-wpe.diff" = "${FR_FILENAME}" ]; then echo "file=0" >> $GITHUB_OUTPUT else echo "file=1" >> $GITHUB_OUTPUT fi if [ "${LATEST}" = "${README}" ]; then echo "readme=0" >> $GITHUB_OUTPUT else echo "readme=1" >> $GITHUB_OUTPUT fi rm releases.atom - name: Check all the things run: | DO_FAIL=0 if [ "${{steps.changelog.outputs.LAST_VER}}" = "${{steps.git.outputs.LAST}}" ]; then echo "[!] Changelog: missing new version" DO_FAIL=1 fi if [ "${{steps.changelog.outputs.CHANGES_FROM}}" != "${{steps.git.outputs.LAST}}" ]; then echo "[!] Changelog: Invalid 'changes from' version" DO_FAIL=1 fi if [ "${{steps.changelog.outputs.ENTRIES}}" -eq 0 ]; then echo '[!] Changelog: Missing entries' DO_FAIL=1 fi date --date="${{steps.changelog.outputs.REL_DATE}}" >/dev/null 2>&1 if [ $? -ne 0 ]; then echo "[!] Changelog: Invalid release date" DO_FAIL=1 fi date --date="1 ${{steps.configure.outputs.VERSION_DATE}}" >/dev/null 2>&1 if [ $? -ne 0 ]; then echo "[!] Configure: Invalid release date" DO_FAIL=1 fi if [ "${{steps.configure.outputs.VERSION }}" = "${{steps.git.outputs.LAST}}" ]; then echo "[!] Version and date in configure.ac must be updated" DO_FAIL=1 fi if [ "${{steps.copyright.outputs.airodump-ng }}" -eq 0 ]; then echo "[!] Missing copyrights in airodump-ng license/help screen" DO_FAIL=1 fi if [ "${{steps.copyright.outputs.aircrack-ng }}" -eq 0 ]; then echo "[!] Missing copyrights in aircrack-ng license/help screen" DO_FAIL=1 fi if [ "${{steps.copyright.outputs.airbase-ng }}" -eq 0 ]; then echo "[!] Missing copyrights in airbase-ng license/help screen" DO_FAIL=1 fi if [ "${{steps.copyright.outputs.aireplay-ng }}" -eq 0 ]; then echo "[!] Missing copyrights in aireplay-ng license/help screen" DO_FAIL=1 fi if [ "${{steps.iw.outputs.update }}" -eq 1 ]; then echo "[!] Airmon-ng: An updated version of iw is available" DO_FAIL=1 fi if [ "${{steps.hostapd.outputs.readme}}" = '1' ]; then echo "[!] Hostapd-WPE: README.md needs an update" DO_FAIL=1 fi if [ "${{steps.hostapd.outputs.file}}" = '1' ]; then echo "[!] Hostapd-WPE: patch needs an update" DO_FAIL=1 fi if [ "${{steps.freeradius.outputs.readme}}" = '1' ]; then echo "[!] Freeradius-WPE: README.md needs an update" DO_FAIL=1 fi if [ "${{steps.freeradius.outputs.file}}" = '1' ]; then echo "[!] Freeradius-WPE: patch needs an update" DO_FAIL=1 fi [ ${DO_FAIL} -eq 1 ] && exit 1 build-other-linux: needs: release-ready uses: ./.github/workflows/manual.yml build-gentoo: needs: release-ready uses: ./.github/workflows/gentoo.yml
Explain the purpose of the module 'aircrack-ng/.github/workflows/codespell.yml'. Describe how it is used in security workflows. Language: YAML.
name: Codespell on: # Allows you to run this workflow manually from the Actions tab workflow_dispatch: push: branches: [ master ] pull_request: branches: [ master ] jobs: codespell: name: Codespell spell checker runs-on: ubuntu-latest steps: - uses: actions/checkout@v3 with: submodules: 'recursive' - name: Install dependencies run: sudo apt update -y && sudo apt install -y codespell - name: Run codespell run: codespell
Explain the purpose of the module 'aircrack-ng/.github/workflows/coverity.yml'. Describe how it is used in security workflows. Language: YAML.
name: Coverity Scan on: workflow_dispatch: schedule: - cron: "0 */12 * * *" jobs: coverity: runs-on: ubuntu-22.04 steps: - name: Git Checkout uses: actions/checkout@v3 with: fetch-depth: 0 - name: Compare revision on Coverity Scan and git id: compare run: | wget https://scan.coverity.com/projects/aircrack-ng COV_REV=$(grep '<p>Version:' aircrack-ng | awk '{print $2}' | cut -b 1-30) echo "Coverity revision: ${COV_REV}" [ -z "${COV_REV}" ] && exit 1 CUR_REV=$(git rev-parse HEAD | cut -b 1-30) echo "Current git revision: ${CUR_REV}" SKIP=false if [ ${COV_REV} == ${CUR_REV} ] || [ -z "$(git diff --name-only ${COV_REV}..HEAD -- . | grep -v -f .coverityignore | grep -v coverityignore)" ]; then SKIP=true fi echo "skip=${SKIP}" >> $GITHUB_OUTPUT - name: Prepare build if: steps.compare.outputs.skip == 'false' run: | autoreconf -vif ./configure --with-experimental --enable-maintainer-mode make clean - name: Build and upload to Coverity Scan uses: vapier/coverity-scan-action@v1 if: steps.compare.outputs.skip == 'false' with: project: Aircrack-ng command: make check email: ${{ secrets.COVERITY_SCAN_EMAIL }} token: ${{ secrets.COVERITY_SCAN_TOKEN }} version: ${{ github.sha }} description: "Git revision: ${{ github.sha }}"
Explain the purpose of the module 'aircrack-ng/.github/workflows/docker-release.yml'. Describe how it is used in security workflows. Language: YAML.
name: Docker build on release on: push: tags: - '*' jobs: docker-release: runs-on: ubuntu-latest strategy: fail-fast: false matrix: platform: [ linux/386, linux/amd64, linux/arm/v5, linux/arm/v7, linux/arm64/v8, linux/mips64le, linux/ppc64le, linux/riscv64, linux/s390x ] steps: - name: Checkout uses: actions/checkout@v3 - name: Set up QEMU uses: docker/setup-qemu-action@v2 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v2 - name: Login to Docker Hub uses: docker/login-action@v2 with: username: ${{ secrets.DOCKERHUB_USERNAME }} password: ${{ secrets.DOCKERHUB_TOKEN }} - name: Build and push uses: docker/build-push-action@v3 with: platforms: ${{ matrix.platform }} build-args: GITHUB_REF_NAME file: Dockerfile.release push: true tags: | aircrackng/release:${{ github.ref_name }}
Explain the purpose of the module 'aircrack-ng/.github/workflows/docker.yml'. Describe how it is used in security workflows. Language: YAML.
name: Docker (git) push to DockerHub on: push: branches: - 'master' paths-ignore: - '.devcontainer/**' - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/almalinux.yml' - '.github/workflows/alpine.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/dragonflybsd.yml' - '.github/workflows/freebsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - 'apparmor/**' - 'contrib/**' - 'patches/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AUTHORS' - 'ChangeLog' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'centos_autotools.sh' - 'scripts/airmon-ng.freebsd' workflow_dispatch: jobs: lint: runs-on: ubuntu-22.04 steps: - name: Git Checkout uses: actions/checkout@v3 - name: Lint Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: Dockerfile verbose: true failure-threshold: error - name: Lint Release Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: './Dockerfile.release' verbose: true failure-threshold: error - name: Shellcheck package install script uses: sudo-bot/action-shellcheck@latest with: cli-args: "docker_package_install.sh" x86: runs-on: ubuntu-22.04 needs: lint steps: - name: Git Checkout uses: actions/checkout@v3 - name: Shorten git revision uses: rlespinasse/shortify-git-revision@v1 with: name: GITHUB_SHA - name: Set up QEMU uses: docker/setup-qemu-action@v2 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v2 - name: Login to Docker Hub if: github.event_name != 'pull_request' uses: docker/login-action@v2 with: username: ${{ secrets.DOCKERHUB_USERNAME }} password: ${{ secrets.DOCKERHUB_TOKEN }} - name: Build and push on linux/amd64 uses: docker/build-push-action@v3 #continue-on-error: true with: platforms: linux/amd64 push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }} - name: Build and push on linux/386 uses: docker/build-push-action@v3 continue-on-error: true with: platforms: linux/386 push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }} armv5-6: runs-on: ubuntu-22.04 needs: lint steps: - name: Git Checkout uses: actions/checkout@v3 - name: Shorten git revision uses: rlespinasse/shortify-git-revision@v1 with: name: GITHUB_SHA - name: Set up QEMU uses: docker/setup-qemu-action@v2 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v2 - name: Login to Docker Hub if: github.event_name != 'pull_request' uses: docker/login-action@v2 with: username: ${{ secrets.DOCKERHUB_USERNAME }} password: ${{ secrets.DOCKERHUB_TOKEN }} - name: Build and push on linux/arm/v5 uses: docker/build-push-action@v3 continue-on-error: true with: platforms: linux/arm/v5 push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }} - name: Build and push on linux/arm/v6 uses: docker/build-push-action@v3 continue-on-error: true with: platforms: linux/arm/v6 build-args: IMAGE_BASE=alpine:3 push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }} arm: runs-on: ubuntu-22.04 needs: lint steps: - name: Git Checkout uses: actions/checkout@v3 - name: Shorten git revision uses: rlespinasse/shortify-git-revision@v1 with: name: GITHUB_SHA - name: Set up QEMU uses: docker/setup-qemu-action@v2 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v2 - name: Login to Docker Hub if: github.event_name != 'pull_request' uses: docker/login-action@v2 with: username: ${{ secrets.DOCKERHUB_USERNAME }} password: ${{ secrets.DOCKERHUB_TOKEN }} - name: Build and push on linux/arm/v7 uses: docker/build-push-action@v3 continue-on-error: true with: platforms: linux/arm/v7 push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }} - name: Build and push on linux/arm64/v8 uses: docker/build-push-action@v3 continue-on-error: true with: platforms: linux/arm64/v8 push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }} others: runs-on: ubuntu-22.04 needs: lint steps: - name: Git Checkout uses: actions/checkout@v3 - name: Shorten git revision uses: rlespinasse/shortify-git-revision@v1 with: name: GITHUB_SHA - name: Set up QEMU uses: docker/setup-qemu-action@v2 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v2 - name: Login to Docker Hub if: github.event_name != 'pull_request' uses: docker/login-action@v2 with: username: ${{ secrets.DOCKERHUB_USERNAME }} password: ${{ secrets.DOCKERHUB_TOKEN }} - name: Build and push on linux/mips64le uses: docker/build-push-action@v3 continue-on-error: true with: platforms: linux/mips64le push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }} - name: Build and push on linux/ppc64le uses: docker/build-push-action@v3 continue-on-error: true with: platforms: linux/ppc64le push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }} - name: Build and push on linux/riscv64 uses: docker/build-push-action@v3 continue-on-error: true with: platforms: linux/riscv64 push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }} - name: Build and push on linux/s390x uses: docker/build-push-action@v3 continue-on-error: true with: platforms: linux/s390x push: ${{ github.event_name != 'pull_request' }} tags: | aircrackng/git:latest aircrackng/git:${{ env.GITHUB_SHA_SHORT }}
Explain the purpose of the module 'aircrack-ng/.github/workflows/dragonflybsd.yml'. Describe how it is used in security workflows. Language: YAML.
name: DragonFlyBSD CI on: # Allows you to run this workflow manually from the Actions tab workflow_dispatch: push: branches: [ master ] paths-ignore: - apparmor/** - contrib/** - manpages/** - patches/** - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/almalinux.yml' - '.github/workflows/alpine.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/freebsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/kali.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AC_VERSION.in' - 'AUTHORS' - 'centos_autotools.sh' - 'ChangeLog' - 'docker_package_install.sh' - 'Dockerfile' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'scripts/airmon-ng.linux' pull_request: branches: [ master ] paths-ignore: - apparmor/** - contrib/** - manpages/** - patches/** - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/almalinux.yml' - '.github/workflows/alpine.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/freebsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/kali.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AC_VERSION.in' - 'AUTHORS' - 'centos_autotools.sh' - 'ChangeLog' - 'docker_package_install.sh' - 'Dockerfile' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'scripts/airmon-ng.linux' env: LANG: en_US.UTF-8 TZ: UTC MAKE: gmake jobs: dragonflybsd: runs-on: macos-12 strategy: fail-fast: false matrix: compiler: - cc: gcc cxx: g++ flags: - name: OpenSSL flags: "" name: DragonFlyBSD ${{ matrix.compiler.cc }} using ${{ matrix.flags.name }} steps: - uses: actions/checkout@v3 with: fetch-depth: 750 submodules: 'recursive' - name: Build with ${{ matrix.compiler.cc }} using ${{ matrix.flags.name }} id: build uses: vmactions/dragonflybsd-vm@v0 with: envs: 'LANG TZ MAKE' usesh: true sync: rsync copyback: false prepare: | pkg install -y git pkgconf shtool libtool ${{ matrix.compiler.cc }} automake autoconf pcre2 sqlite3 gmake cmocka run: | export CC="${{ matrix.compiler.cc }}" export CXX="${{ matrix.compiler.cxx }}" alias nproc='sysctl -n hw.ncpu' CPUS=$(nproc) git config --global --add safe.directory /Users/runner/work/aircrack-ng/aircrack-ng echo "::group::make distclean" make distclean || : echo "::endgroup::" echo "::group::autoreconf" autoreconf -vif echo "::endgroup::" echo "::group::configure" echo ">> Configure with $CC, $CXX, and ${{ matrix.flags.flags }}" ./configure --enable-maintainer-mode --with-experimental --without-opt || { cat config.log; exit 1; } echo "::endgroup::" echo "::group::build" echo ">> Build using ${CPUS} jobs" gmake -j ${CPUS} echo "::endgroup::" echo "::group::run tests" gmake -j ${CPUS} check || { find . -name 'test-suite.log' -exec cat {} ';' && exit 1; } echo "::endgroup::"
Explain the purpose of the module 'aircrack-ng/.github/workflows/freebsd.yml'. Describe how it is used in security workflows. Language: YAML.
name: FreeBSD CI on: # Allows you to run this workflow manually from the Actions tab workflow_dispatch: push: branches: [ master ] paths-ignore: - apparmor/** - contrib/** - manpages/** - patches/** - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/almalinux.yml' - '.github/workflows/alpine.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/dragonflybsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/kali.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AC_VERSION.in' - 'AUTHORS' - 'centos_autotools.sh' - 'ChangeLog' - 'docker_package_install.sh' - 'Dockerfile' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'scripts/airmon-ng.linux' pull_request: branches: [ master ] paths-ignore: - apparmor/** - contrib/** - manpages/** - patches/** - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/almalinux.yml' - '.github/workflows/alpine.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/dragonflybsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/kali.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AC_VERSION.in' - 'AUTHORS' - 'centos_autotools.sh' - 'ChangeLog' - 'docker_package_install.sh' - 'Dockerfile' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'scripts/airmon-ng.linux' env: LANG: en_US.UTF-8 TZ: UTC MAKE: gmake jobs: freebsd: runs-on: macos-12 strategy: fail-fast: false matrix: compiler: - cc: gcc cxx: g++ flags: - name: OpenSSL flags: "" name: FreeBSD ${{ matrix.compiler.cc }} using ${{ matrix.flags.name }} steps: - uses: actions/checkout@v3 with: fetch-depth: 750 submodules: 'recursive' - name: Build with ${{ matrix.compiler.cc }} using ${{ matrix.flags.name }} id: build uses: vmactions/freebsd-vm@v0 with: envs: 'LANG TZ MAKE' usesh: true sync: rsync copyback: false prepare: | pkg install -y git pkgconf shtool libtool gcc automake autoconf pcre2 sqlite3 openssl gmake hwloc cmocka run: | export CC="${{ matrix.compiler.cc }}" export CXX="${{ matrix.compiler.cxx }}" alias nproc='sysctl -n hw.ncpu' CPUS=$(nproc) git config --global --add safe.directory /Users/runner/work/aircrack-ng/aircrack-ng echo "::group::make distclean" make distclean || : echo "::endgroup::" echo "::group::autoreconf" autoreconf -vif echo "::endgroup::" echo "::group::configure" echo ">> Configure with $CC, $CXX, and ${{ matrix.flags.flags }}" ./configure --enable-maintainer-mode --with-experimental --without-opt || { cat config.log; exit 1; } echo "::endgroup::" echo "::group::build" echo ">> Build using ${CPUS} jobs" gmake -j ${CPUS} echo "::endgroup::" echo "::group::run tests" gmake -j ${CPUS} check || { find . -name 'test-suite.log' -exec cat {} ';' && exit 1; } echo "::endgroup::"
Explain the purpose of the module 'aircrack-ng/.github/workflows/gentoo.yml'. Describe how it is used in security workflows. Language: YAML.
name: Gentoo CI on: push: branches: [ master ] paths: - '.github/workflows/gentoo.yml' pull_request: branches: [ master ] paths: - '.github/workflows/gentoo.yml' workflow_call: workflow_dispatch: jobs: gentoo: runs-on: ubuntu-22.04 steps: - name: Git Checkout uses: actions/checkout@v3 - name: Lint Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: Dockerfile verbose: true failure-threshold: error - name: Lint Release Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: './Dockerfile.release' verbose: true failure-threshold: error - name: Shellcheck package install script uses: sudo-bot/action-shellcheck@latest with: cli-args: "docker_package_install.sh" - name: Set up QEMU uses: docker/setup-qemu-action@v2 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v2 - name: Build on linux/amd64 uses: docker/build-push-action@v3 with: platforms: linux/amd64 build-args: "IMAGE_BASE=gentoo/stage3" push: false
Explain the purpose of the module 'aircrack-ng/.github/workflows/irc.yml'. Describe how it is used in security workflows. Language: YAML.
name: IRC notifications on: [push, pull_request, create, issues] jobs: notification: runs-on: ubuntu-22.04 name: IRC Notification steps: - name: Skip if not aircrack-ng/aircrack-ng run: | if [ "${{ github.repository }}" != 'aircrack-ng/aircrack-ng' ]; then exit 1 fi # If 2 consecutive calls happen, the second one can fail as # it's not able to get the username requested - name: Generate random username id: random run: | USERNAME=$(mktemp -u | awk -F. '{print "gh-a-ng-" $2}') echo "username=${USERNAME}" >> $GITHUB_OUTPUT - name: Commit uses: Gottox/irc-message-action@v2.1.3 if: github.event_name == 'push' with: channel: '#aircrack-ng' nickname: ${{steps.random.outputs.username}} message: |- Commit by ${{ github.actor }}: ${{ github.event.compare }} ${{ join(github.event.commits.*.message) }} - name: Pull Request Created uses: Gottox/irc-message-action@v2.1.3 if: github.event_name == 'pull_request' with: channel: '#aircrack-ng' nickname: ${{steps.random.outputs.username}} message: |- New pull request #${{ github.event.number }} by ${{ github.actor }}: ${{ github.event.pull_request.title }} - ${{ github.event.pull_request.html_url }} - name: Issue created uses: Gottox/irc-message-action@v2.1.3 if: github.event_name == 'issues' && github.event.action == 'opened' && github.event.issue.draft == false with: channel: '#aircrack-ng' nickname: ${{steps.random.outputs.username}} message: |- New issue #${{github.event.issue.number}} (${{github.event.issue.url}}) by ${{ github.actor }}: ${{github.event.issue.title}} () - name: New tag/release uses: Gottox/irc-message-action@v2.1.3 if: github.event_name == 'create' && github.event.ref_type == 'tag' with: channel: '#aircrack-ng' nickname: ${{steps.random.outputs.username}} message: |- New release in GitHub: ${{ github.event.ref }}
Explain the purpose of the module 'aircrack-ng/.github/workflows/kali.yml'. Describe how it is used in security workflows. Language: YAML.
name: Kali Linux CI on: push: branches: - 'master' paths-ignore: - '.devcontainer/**' - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/almalinux.yml' - '.github/workflows/alpine.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/dragonflybsd.yml' - '.github/workflows/freebsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - 'apparmor/**' - 'contrib/**' - 'manpages/**' - 'patches/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AUTHORS' - 'ChangeLog' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'centos_autotools.sh' - 'scripts/airmon-ng.freebsd' pull_request: branches: [ master ] paths-ignore: - '.devcontainer/**' - '.coverityignore' - '.github/workflows/gentoo.yml' - '.github/ISSUE_TEMPLATE/**' - '.github/workflows/almalinux.yml' - '.github/workflows/alpine.yml' - '.github/workflows/check-release-ready.yml' - '.github/workflows/codespell.yml' - '.github/workflows/coverity.yml' - '.github/workflows/docker.yml' - '.github/workflows/docker-release.yml' - '.github/workflows/dragonflybsd.yml' - '.github/workflows/freebsd.yml' - '.github/workflows/irc.yml' - '.github/workflows/linux.yml' - '.github/workflows/linux-pcre.yml' - '.github/workflows/macos.yml' - '.github/workflows/manual.yml' - '.github/workflows/markdown-link.yml' - '.github/workflows/netbsd.yml' - '.github/workflows/openbsd.yml' - '.github/workflows/pvs-studio.yml' - '.github/workflows/scanbuild.yml' - '.github/workflows/style.yml' - '.github/workflows/windows.yml' - '.vscode/**' - 'apparmor/**' - 'contrib/**' - 'manpages/**' - 'patches/**' - '.clang-format' - '.editorconfig' - '.gitignore' - '.pre-commit-config.yaml' - 'AUTHORS' - 'ChangeLog' - 'Dockerfile.release' - 'INSTALLING' - 'LICENSE' - 'LICENSE.OpenSSL' - 'README' - 'README.md' - 'SECURITY.md' - 'centos_autotools.sh' - 'scripts/airmon-ng.freebsd' jobs: lint: runs-on: ubuntu-22.04 steps: - name: Git Checkout uses: actions/checkout@v3 - name: Lint Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: Dockerfile verbose: true failure-threshold: error - name: Lint Release Dockerfile uses: hadolint/hadolint-action@v3.1.0 with: dockerfile: './Dockerfile.release' verbose: true failure-threshold: error - name: Shellcheck package install script uses: sudo-bot/action-shellcheck@latest with: cli-args: "docker_package_install.sh" kali: runs-on: ubuntu-22.04 needs: lint steps: - name: Set up QEMU uses: docker/setup-qemu-action@v2 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v2 - name: Build on linux/amd64 uses: docker/build-push-action@v3 with: platforms: linux/amd64 build-args: IMAGE_BASE=kalilinux/kali-rolling:latest push: false
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
14