[PATCH] gnu: Add ncrack.

  • Open
  • quality assurance status badge
Details
2 participants
  • Maxim Cournoyer
  • phodina
Owner
unassigned
Submitted by
phodina
Severity
normal
P
P
phodina wrote on 2 Dec 2022 06:21
(name . Guix Patches)(address . guix-patches@gnu.org)
WSgbTIT-0EVw00x79M1C4IoJnu497WH90q_x9HrwP736-BdOVcs0KaKNx9tcSaZu3u7jA6G8tnr7tsS9eUcIwrh3_DziU2imKAVbzDkx0Xo=@protonmail.com
Hi,

here's another penetration testing tool - ncrack. Slowly catching up to Kali :-)

----
Petr
Attachment: file
M
M
Maxim Cournoyer wrote on 16 Jan 2023 15:13
(name . phodina)(address . phodina@protonmail.com)(address . 59760@debbugs.gnu.org)
878ri2bm9p.fsf@gmail.com
Hi Petr,

phodina <phodina@protonmail.com> writes:

Toggle quote (11 lines)
> Hi,
>
> here's another penetration testing tool - ncrack. Slowly catching up to Kali :-)
>
> ----
> Petr
> From cfcc719c2fc2e40fb2936269dc4bdbd28be5d71a Mon Sep 17 00:00:00 2001
> From: Petr Hodina <phodina@protonmail.com>
> Date: Fri, 10 Jun 2022 10:26:13 +0200
> Subject: [PATCH] gnu: Add ncrack.

Neat, thank you!

[...]

Toggle quote (4 lines)
> * gnu/packages/patches/ncrack-fix-spelling-errors.patch: New file.
> * gnu/packages/patches/ncrack-nullcheck.patch: New file.
> * gnu/packages/patches/ncrack-unbundle-opensshlib.patch: New file.

The patches above have unclear upstream status; could you annotate the
files with the information? They should be submitted upstream for
consideration. For upstream to consider your last patch though, you'd
want to have the opensshlib patch configurable via a configure.ac check
or option. It could for example check for a system-provided opensshlib
and use this, else fall-back to the bundled library build that it
currently does.

Toggle quote (34 lines)
> diff --git a/gnu/packages/networking.scm b/gnu/packages/networking.scm
> index 3f44d082fb..ce004c52f0 100644
> --- a/gnu/packages/networking.scm
> +++ b/gnu/packages/networking.scm
> @@ -786,6 +786,35 @@ (define-public knockd
> at the link-layer level.")
> (license license:gpl2+)))
>
> +(define-public ncrack
> + (package
> + (name "ncrack")
> + (version "0.7")
> + (source (origin
> + (method url-fetch)
> + (uri (string-append
> + "https://github.com/nmap/ncrack/archive/refs/tags/"
> + version ".tar.gz"))
> + (patches (search-patches "ncrack-nullcheck.patch"
> + "ncrack-fix-gcc-10-build.patch"
> + "ncrack-fix-autotools-compat.patch"
> + "ncrack-fix-spelling-errors.patch"))
> + (sha256
> + (base32
> + "0jnif319rjykiphi211v1c2hblw1ql190dnbd030qjkwcz6p3ygk"))))
> + (build-system gnu-build-system)
> + (arguments
> + (list #:tests? #f)) ;no test suite
> + (native-inputs (list pkg-config))
> + (inputs (list openssl zlib))
> + (home-page "https://nmap.org/ncrack/man.html")
> + (synopsis "Network authentication cracking tool")
> + (description
> + "@code{Ncrack} is a tool for network authentication cracking. It was

To be more accurate, I'd use "The @command{ncrack} command is a tool for
[...]".

Otherwise, LGTM.

--
Thanks,
Maxim
?