summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--network/kismet/README14
-rw-r--r--network/kismet/doinst.sh12
-rw-r--r--network/kismet/kismet.SlackBuild110
-rw-r--r--network/kismet/kismet.info10
-rw-r--r--network/kismet/slack-desc19
5 files changed, 165 insertions, 0 deletions
diff --git a/network/kismet/README b/network/kismet/README
new file mode 100644
index 0000000000..14785e1853
--- /dev/null
+++ b/network/kismet/README
@@ -0,0 +1,14 @@
+Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion
+detection system. Kismet will work with any wireless card which supports raw
+monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b,
+802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which
+allow sniffing other media such as DECT.
+
+Kismet identifies networks by passively collecting packets and detecting
+standard named networks, detecting (and given time, decloaking) hidden
+networks, and inferring the presence of nonbeaconing networks via data traffic.
+
+This script requires a 'kismet' group to exist before running. The recommended
+GID is 234. You can create it like this: groupadd -g 234 kismet
+
+After installation, add user to kismet group and re-login.
diff --git a/network/kismet/doinst.sh b/network/kismet/doinst.sh
new file mode 100644
index 0000000000..f9e45084c6
--- /dev/null
+++ b/network/kismet/doinst.sh
@@ -0,0 +1,12 @@
+config() {
+ NEW="$1"
+ OLD="$(dirname $NEW)/$(basename $NEW .new)"
+ # If there's no config file by that name, mv it over:
+ if [ ! -r $OLD ]; then
+ mv $NEW $OLD
+ elif [ "$(cat $OLD | md5sum)" = "$(cat $NEW | md5sum)" ]; then # toss the redundant copy
+ rm $NEW
+ fi
+ # Otherwise, we leave the .new copy for the admin to consider...
+}
+
diff --git a/network/kismet/kismet.SlackBuild b/network/kismet/kismet.SlackBuild
new file mode 100644
index 0000000000..17354f962c
--- /dev/null
+++ b/network/kismet/kismet.SlackBuild
@@ -0,0 +1,110 @@
+#!/bin/sh
+
+# Slackware build script for kismet
+# Written by Audrius Kažukauskas <audrius@neutrino.lt>
+# Modified by Robby Workman <rworkman@slackbuilds.org>
+# Modified by Antonio Hernández Blas <hba.nihilismus@gmail.com>
+
+PRGNAM=kismet
+VERSION=${VERSION:-2010_01_R1}
+BUILD=${BUILD:-1}
+TAG=${TAG:-_SBo}
+
+SRCVERSION=$(echo $VERSION | tr _ -)
+
+if [ -z "$ARCH" ]; then
+ case "$( uname -m )" in
+ i?86) ARCH=i486 ;;
+ arm*) ARCH=arm ;;
+ *) ARCH=$( uname -m ) ;;
+ esac
+fi
+
+CWD=$(pwd)
+TMP=${TMP:-/tmp/SBo}
+PKG=$TMP/package-$PRGNAM
+OUTPUT=${OUTPUT:-/tmp}
+
+if [ "$ARCH" = "i486" ]; then
+ SLKCFLAGS="-O2 -march=i486 -mtune=i686"
+ LIBDIRSUFFIX=""
+elif [ "$ARCH" = "i686" ]; then
+ SLKCFLAGS="-O2 -march=i686 -mtune=i686"
+ LIBDIRSUFFIX=""
+elif [ "$ARCH" = "x86_64" ]; then
+ SLKCFLAGS="-O2 -fPIC"
+ LIBDIRSUFFIX="64"
+else
+ SLKCFLAGS="-O2"
+ LIBDIRSUFFIX=""
+fi
+
+# Bail if group isn't valid on your system.
+# gid=234 is suggested to avoid conflicts with other SBo packages,
+# but it's your call: http://slackbuilds.org/uid_gid.txt
+if ! grep -q "^kismet:" /etc/group; then
+ printf "\n\tYou must have a kismet group to run this script.\n"
+ printf "\tSomething like this should suffice for most systems:\n"
+ printf "\t# groupadd -g 234 kismet\n\n"
+ exit 1
+fi
+
+set -e
+
+rm -rf $PKG
+mkdir -p $TMP $PKG $OUTPUT
+cd $TMP
+rm -rf $PRGNAM-$VERSION
+
+tar xvf $CWD/$PRGNAM-$SRCVERSION.tar.gz
+mv $PRGNAM-$SRCVERSION $PRGNAM-$VERSION
+cd $PRGNAM-$VERSION
+
+chown -R root:root .
+chmod -R u+w,go+r-w,a-s .
+
+sed -i "s|/lib/kismet|/lib$LIBDIRSUFFIX/kismet|" plugin-*/Makefile
+
+CFLAGS="$SLKCFLAGS" \
+CXXFLAGS="$SLKCFLAGS" \
+./configure \
+ --prefix=/usr \
+ --libdir=/usr/lib${LIBDIRSUFFIX} \
+ --sysconfdir=/etc/kismet \
+ --localstatedir=/var \
+ --mandir=/usr/man \
+ --build=$ARCH-slackware-linux
+
+make
+make plugins
+make suidinstall MANGRP=root DESTDIR=$PKG
+make plugins-install MANGRP=root DESTDIR=$PKG
+
+find $PKG | xargs file | grep -e "executable" -e "shared object" | grep ELF \
+ | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null || true
+
+find $PKG/usr/man -type f -exec gzip -9 {} \;
+for i in $( find $PKG/usr/man -type l ) ; do ln -s $( readlink $i ).gz $i.gz ; rm $i ; done
+
+mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION
+cp -a CHANGELOG* GPL README* *.txt docs/ patches/ $PKG/usr/doc/$PRGNAM-$VERSION
+cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild
+
+mkdir -p $PKG/install
+cat $CWD/slack-desc > $PKG/install/slack-desc
+cat $CWD/doinst.sh > $PKG/install/doinst.sh
+
+# Add .new extension to all configuration files.
+for file in $(find $PKG/etc -type f)
+do
+ mv $file $file.new
+done
+
+# Add *.new files into doinst.sh
+for file in $(find $PKG/etc -type f -name "*.new")
+do
+ echo config $(echo $file | sed "s:$PKG/::") >> $PKG/install/doinst.sh
+done
+
+cd $PKG
+/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.${PKGTYPE:-tgz}
diff --git a/network/kismet/kismet.info b/network/kismet/kismet.info
new file mode 100644
index 0000000000..830052ea71
--- /dev/null
+++ b/network/kismet/kismet.info
@@ -0,0 +1,10 @@
+PRGNAM="kismet"
+VERSION="2010_01_R1"
+HOMEPAGE="http://kismetwireless.net/"
+DOWNLOAD="http://kismetwireless.net/code/kismet-2010-01-R1.tar.gz"
+MD5SUM="a6d6edcf65d5bb2cb5de6472bcc16f19"
+DOWNLOAD_x86_64=""
+MD5SUM_x86_64=""
+MAINTAINER="Audrius Kažukauskas"
+EMAIL="audrius@neutrino.lt"
+APPROVED="rworkman"
diff --git a/network/kismet/slack-desc b/network/kismet/slack-desc
new file mode 100644
index 0000000000..43898d8471
--- /dev/null
+++ b/network/kismet/slack-desc
@@ -0,0 +1,19 @@
+# HOW TO EDIT THIS FILE:
+# The "handy ruler" below makes it easier to edit a package description. Line
+# up the first '|' above the ':' following the base package name, and the '|'
+# on the right side marks the last column you can put a character in. You must
+# make exactly 11 lines for the formatting to be correct. It's also
+# customary to leave one space after the ':'.
+
+ |-----handy-ruler------------------------------------------------------|
+kismet: Kismet (wireless network detector)
+kismet:
+kismet: Kismet is an 802.11 layer2 wireless network detector, sniffer, and
+kismet: intrusion detection system. Kismet will work with any wireless card
+kismet: which supports raw monitoring (rfmon) mode, and can sniff 802.11b,
+kismet: 802.11a, 802.11g and 802.11n traffic. Kismet also supports plugins
+kismet: which allow sniffing other media such as DECT.
+kismet:
+kismet: Homepage: http://kismetwireless.net/
+kismet:
+kismet: