]>
Commit | Line | Data |
---|---|---|
127b9c2e | 1 | Summary: active sniffer |
2 | Summary(pl): aktywny sniffer | |
3 | Name: angst | |
4 | Version: 0.4b | |
5 | Release: 1 | |
6 | License: BSD | |
7 | Group: Networking/Utilities | |
58d4e549 | 8 | Source0: http://heanet.dl.sourceforge.net/angst/%{name}-%{version}.tar.gz |
127b9c2e | 9 | # Source0-md5: 21643cd776bf478c6fbe4ddabb826be8 |
10 | Patch0: %{name}-DESTDIR.patch | |
11 | Patch1: %{name}-libnet.patch | |
12 | URL: http://angst.sourceforge.net/ | |
daf524c8 | 13 | BuildRequires: libnet1-devel |
127b9c2e | 14 | BuildRequires: libpcap-devel |
15 | BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n) | |
16 | ||
17 | %description | |
18 | Angst is an active sniffer, based on libpcap and libnet. Angst | |
19 | provides methods for aggressive sniffing on switched local area | |
20 | network environments. It dumps the payload of all the TCP packets | |
21 | received on the specified ports. Moreover, it implements methods for | |
22 | active sniffing. Angst currently provides two active sniffing methods. | |
23 | The first monitors ARP requests, and after enabling IP forwarding on | |
24 | the local host, sends ARP replies mapping all IPs to the local MAC | |
25 | address. The second method floods the local network with random MAC | |
26 | addresses (like macof v1.1 by Ian Vitek), causing switches to send | |
27 | packets to all ports. | |
28 | ||
29 | %prep | |
30 | %setup -q | |
31 | %patch0 -p1 | |
32 | %patch1 -p1 | |
33 | ||
34 | mv Makefile.linux Makefile | |
35 | ||
36 | %build | |
fe4d092d | 37 | %{__make} \ |
38 | CC="%{__cc}" | |
39 | CFLAGS="%{rpmcflags}" | |
127b9c2e | 40 | |
41 | %install | |
42 | rm -rf $RPM_BUILD_ROOT | |
43 | ||
44 | %{__make} install \ | |
45 | DESTDIR=$RPM_BUILD_ROOT | |
46 | ||
47 | %clean | |
48 | rm -rf $RPM_BUILD_ROOT | |
49 | ||
50 | %files | |
51 | %defattr(644,root,root,755) | |
52 | %doc ChangeLog README TODO | |
53 | %attr(755,root,root) %{_sbindir}/* | |
54 | %{_mandir}/man8/%{name}.8* |