[PATCH] gnu: Add ncrack.

  • Open
  • quality assurance status badge
Details
2 participants
  • Maxim Cournoyer
  • phodina
Owner
unassigned
Submitted by
phodina
Severity
normal
P
P
phodina wrote on 2 Dec 2022 06:21
(name . Guix Patches)(address . guix-patches@gnu.org)
WSgbTIT-0EVw00x79M1C4IoJnu497WH90q_x9HrwP736-BdOVcs0KaKNx9tcSaZu3u7jA6G8tnr7tsS9eUcIwrh3_DziU2imKAVbzDkx0Xo=@protonmail.com
Hi,

here's another penetration testing tool - ncrack. Slowly catching up to Kali :-)

----
Petr
Attachment: file
M
M
Maxim Cournoyer wrote on 16 Jan 2023 15:13
(name . phodina)(address . phodina@protonmail.com)(address . 59760@debbugs.gnu.org)
878ri2bm9p.fsf@gmail.com
Hi Petr,

phodina <phodina@protonmail.com> writes:

Toggle quote (11 lines)
> Hi,
>
> here's another penetration testing tool - ncrack. Slowly catching up to Kali :-)
>
> ----
> Petr
> From cfcc719c2fc2e40fb2936269dc4bdbd28be5d71a Mon Sep 17 00:00:00 2001
> From: Petr Hodina <phodina@protonmail.com>
> Date: Fri, 10 Jun 2022 10:26:13 +0200
> Subject: [PATCH] gnu: Add ncrack.

Neat, thank you!

[...]

Toggle quote (4 lines)
> * gnu/packages/patches/ncrack-fix-spelling-errors.patch: New file.
> * gnu/packages/patches/ncrack-nullcheck.patch: New file.
> * gnu/packages/patches/ncrack-unbundle-opensshlib.patch: New file.

The patches above have unclear upstream status; could you annotate the
files with the information? They should be submitted upstream for
consideration. For upstream to consider your last patch though, you'd
want to have the opensshlib patch configurable via a configure.ac check
or option. It could for example check for a system-provided opensshlib
and use this, else fall-back to the bundled library build that it
currently does.

Toggle quote (34 lines)
> diff --git a/gnu/packages/networking.scm b/gnu/packages/networking.scm
> index 3f44d082fb..ce004c52f0 100644
> --- a/gnu/packages/networking.scm
> +++ b/gnu/packages/networking.scm
> @@ -786,6 +786,35 @@ (define-public knockd
> at the link-layer level.")
> (license license:gpl2+)))
>
> +(define-public ncrack
> + (package
> + (name "ncrack")
> + (version "0.7")
> + (source (origin
> + (method url-fetch)
> + (uri (string-append
> + "https://github.com/nmap/ncrack/archive/refs/tags/"
> + version ".tar.gz"))
> + (patches (search-patches "ncrack-nullcheck.patch"
> + "ncrack-fix-gcc-10-build.patch"
> + "ncrack-fix-autotools-compat.patch"
> + "ncrack-fix-spelling-errors.patch"))
> + (sha256
> + (base32
> + "0jnif319rjykiphi211v1c2hblw1ql190dnbd030qjkwcz6p3ygk"))))
> + (build-system gnu-build-system)
> + (arguments
> + (list #:tests? #f)) ;no test suite
> + (native-inputs (list pkg-config))
> + (inputs (list openssl zlib))
> + (home-page "https://nmap.org/ncrack/man.html")
> + (synopsis "Network authentication cracking tool")
> + (description
> + "@code{Ncrack} is a tool for network authentication cracking. It was

To be more accurate, I'd use "The @command{ncrack} command is a tool for
[...]".

Otherwise, LGTM.

--
Thanks,
Maxim
?
Your comment

Commenting via the web interface is currently disabled.

To comment on this conversation send an email to 59760@debbugs.gnu.org

To respond to this issue using the mumi CLI, first switch to it
mumi current 59760
Then, you may apply the latest patchset in this issue (with sign off)
mumi am -- -s
Or, compose a reply to this issue
mumi compose
Or, send patches to this issue
mumi send-email *.patch