]>
Commit | Line | Data |
---|---|---|
127b9c2e | 1 | Summary: active sniffer |
2 | Summary(pl): aktywny sniffer | |
3 | Name: angst | |
4 | Version: 0.4b | |
5 | Release: 1 | |
6 | License: BSD | |
7 | Group: Networking/Utilities | |
8 | Source0: http://dl.sourceforge.net/angst/%{name}-%{version}.tar.gz | |
9 | # Source0-md5: 21643cd776bf478c6fbe4ddabb826be8 | |
10 | Patch0: %{name}-DESTDIR.patch | |
11 | Patch1: %{name}-libnet.patch | |
12 | URL: http://angst.sourceforge.net/ | |
13 | BuildRequires: libnet-devel | |
14 | BuildRequires: libpcap-devel | |
15 | BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n) | |
16 | ||
17 | %description | |
18 | Angst is an active sniffer, based on libpcap and libnet. Angst | |
19 | provides methods for aggressive sniffing on switched local area | |
20 | network environments. It dumps the payload of all the TCP packets | |
21 | received on the specified ports. Moreover, it implements methods for | |
22 | active sniffing. Angst currently provides two active sniffing methods. | |
23 | The first monitors ARP requests, and after enabling IP forwarding on | |
24 | the local host, sends ARP replies mapping all IPs to the local MAC | |
25 | address. The second method floods the local network with random MAC | |
26 | addresses (like macof v1.1 by Ian Vitek), causing switches to send | |
27 | packets to all ports. | |
28 | ||
29 | %prep | |
30 | %setup -q | |
31 | %patch0 -p1 | |
32 | %patch1 -p1 | |
33 | ||
34 | mv Makefile.linux Makefile | |
35 | ||
36 | %build | |
37 | %{__make} | |
38 | ||
39 | %install | |
40 | rm -rf $RPM_BUILD_ROOT | |
41 | ||
42 | %{__make} install \ | |
43 | DESTDIR=$RPM_BUILD_ROOT | |
44 | ||
45 | %clean | |
46 | rm -rf $RPM_BUILD_ROOT | |
47 | ||
48 | %files | |
49 | %defattr(644,root,root,755) | |
50 | %doc ChangeLog README TODO | |
51 | %attr(755,root,root) %{_sbindir}/* | |
52 | %{_mandir}/man8/%{name}.8* |