File: control

package info (click to toggle)
cowpatty 4.8-2
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid
  • size: 468 kB
  • sloc: ansic: 2,576; makefile: 121
file content (23 lines) | stat: -rw-r--r-- 892 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Source: cowpatty
Section: net
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Samuel Henrique <samueloph@debian.org>
Build-Depends: debhelper (>= 11),
               libpcap-dev,
               libssl-dev
Standards-Version: 4.2.1
Homepage: http://www.willhackforsushi.com/?page_id=50
Vcs-Browser: https://salsa.debian.org/pkg-security-team/cowpatty
Vcs-Git: https://salsa.debian.org/pkg-security-team/cowpatty.git

Package: cowpatty
Architecture: any
Depends: ${misc:Depends},
         ${shlibs:Depends}
Description: Brute-force WPA dictionary attack
 If you are auditing WPA-PSK or WPA2-PSK networks, you can use
 this tool to identify weak passphrases that were used to generate the
 PMK.  Supply a libpcap capture file that includes the 4-way handshake, a
 dictionary file of passphrases to guess with, and the SSID for the
 network.