123456789101112131415161718192021222324252627282930313233343536373839404142434445 |
- <?xml version="1.0" ?>
- <!DOCTYPE PISI SYSTEM "http://www.pisilinux.org/projeler/pisi/pisi-spec.dtd">
- <PISI>
- <Source>
- <Name>asleap</Name>
- <Homepage>http://www.willhackforsushi.com/?page_id=41</Homepage>
- <Packager>
- <Name>İbrahim KARAGÜZEL</Name>
- <Email>karaguzelibrahim@gmail.com</Email>
- </Packager>
- <License>GPLv2</License>
- <PartOf>network</PartOf>
- <IsA>app:console</IsA>
- <Summary>Actively recover LEAP/PPTP passwords</Summary>
- <Description>Demonstrates a serious deficiency in proprietary Cisco LEAP networks. Since LEAP uses a variant of MS-CHAPv2 for the authentication exchange, it is susceptible to accelerated offline dictionary attacks. Asleap can also attack the Point-to-Point Tunneling Protocol (PPTP), and any MS-CHAPv2 exchange where you can specify the challenge and response values on the command line.</Description>
- <BuildDependencies>
- <Dependency>libpcap-devel</Dependency>
- <Dependency>openssl-devel</Dependency>
- </BuildDependencies>
- <Archive sha1sum="5781cf462adc3e35b98c4aaa18c082c17fede0fa" type="targz">http://www.willhackforsushi.com/code/asleap/2.2/asleap-2.2.tgz</Archive>
- </Source>
- <Package>
- <Name>asleap</Name>
- <Summary>Actively recover LEAP/PPTP passwords</Summary>
- <RuntimeDependencies>
- <Dependency>libpcap</Dependency>
- <Dependency>openssl</Dependency>
- </RuntimeDependencies>
- <Files>
- <Path fileType="executable">/usr/bin</Path>
- <Path fileType="doc">/usr/share/doc</Path>
- <Path fileType="man">/usr/share/man</Path>
- </Files>
- </Package>
- <History>
- <Update release="1">
- <Date>2016-02-11</Date>
- <Version>2.2</Version>
- <Comment>First Pisi Built</Comment>
- <Name>İbrahim KARAGÜZEL</Name>
- <Email>karaguzelibrahim@gmail.com</Email>
- </Update>
- </History>
- </PISI>
|