summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorobrien <obrien@FreeBSD.org>1997-03-09 21:34:26 +0000
committerobrien <obrien@FreeBSD.org>1997-03-09 21:34:26 +0000
commit9541744ae413b8f23929a4c189c00b03fb5a24b8 (patch)
tree27cae8e61ddbbb7104888097860f188ecf361b93 /security
parent685c9dc3d2c4f90671599a998b57d9c7333db037 (diff)
downloadFreeBSD-ports-9541744ae413b8f23929a4c189c00b03fb5a24b8.zip
FreeBSD-ports-9541744ae413b8f23929a4c189c00b03fb5a24b8.tar.gz
John the Ripper is a UNIX password cracker, currently available for UNIX
(tested with Linux x86, FreeBSD x86, Solaris 2.x SPARC, OSF/1 Alpha), DOS, WinNT/Win95. John the Ripper supports the following cracking modes: - wordlist with or without rules; - "single crack", makes use of the login/GECOS information; - incremental, tries all character combinations; - external, allows you to define your own cracking mode. - MD5 based password files support
Diffstat (limited to 'security')
-rw-r--r--security/john/Makefile58
-rw-r--r--security/john/distinfo1
-rw-r--r--security/john/pkg-comment1
-rw-r--r--security/john/pkg-descr11
-rw-r--r--security/john/pkg-message2
-rw-r--r--security/john/pkg-plist9
6 files changed, 82 insertions, 0 deletions
diff --git a/security/john/Makefile b/security/john/Makefile
new file mode 100644
index 0000000..548b054
--- /dev/null
+++ b/security/john/Makefile
@@ -0,0 +1,58 @@
+# ex:ts=8
+# Ports collection makefile for: ufcjohn
+# Version required: 1.4
+# Date created: Sun Mar 09, 1997
+# Whom: David O'Brien (obrien@FreeBSD.org)
+#
+# $Id: Makefile,v 1.2 1997/01/25 18:08:40 obrien Exp $
+#
+
+DISTNAME= ucfjohn3
+PKGNAME= john-1.4
+CATEGORIES= security
+MASTER_SITES= http://www.false.com/security/john/
+EXTRACT_SUFX= .zip
+
+MAINTAINER= obrien@NUXI.com
+
+BUILD_DEPENDS= unzip:${PORTSDIR}/archivers/unzip
+
+EXTRACT_CMD= unzip
+EXTRACT_ARGS= -oqL
+NO_WRKSUBDIR= yes
+ALL_TARGET= freebsd
+
+.if exists(/bin/tar)
+TAR_CMD?= /bin/tar
+.else
+TAR_CMD?= /usr/bin/tar
+.endif
+
+post-extract:
+ @(cd ${WRKSRC} ; ${TAR_CMD} -xzf sources.tgz)
+ @(cd ${WRKSRC} ; ${EXTRACT_CMD} ${EXTRACT_ARGS} common.zip)
+ @(cd ${WRKSRC} ; ${EXTRACT_CMD} ${EXTRACT_ARGS} doc.zip)
+
+do-configure:
+ /bin/mv ${WRKSRC}/john.ini ${WRKSRC}/john.ini.in
+ sed -e "s:all.chr:${PREFIX}/share/john/all.chr:" \
+ -e "s:alpha.chr:${PREFIX}/share/john/alpha.chr:" \
+ -e "s:digits.chr:${PREFIX}/share/john/digits.chr:" \
+ ${WRKSRC}/john.ini.in > ${WRKSRC}/john.ini
+
+do-install:
+ @${MKDIR} ${PREFIX}/share/john
+ @${INSTALL_PROGRAM} ${WRKSRC}/john ${PREFIX}/bin
+ @(cd ${PREFIX}/bin ; /bin/ln -sf john xtract)
+ @(cd ${PREFIX}/bin ; /bin/ln -sf john unshadow)
+ @${INSTALL_DATA} ${WRKSRC}/all.chr ${PREFIX}/share/john
+ @${INSTALL_DATA} ${WRKSRC}/alpha.chr ${PREFIX}/share/john
+ @${INSTALL_DATA} ${WRKSRC}/digits.chr ${PREFIX}/share/john
+ @${INSTALL_DATA} ${WRKSRC}/john.ini ${PREFIX}/share/john
+ @${INSTALL_DATA} ${WRKSRC}/password.lst ${PREFIX}/share/john
+.if !defined(NOPORTDOCS)
+ @${MKDIR} ${PREFIX}/share/doc/john
+ @${INSTALL_DATA} ${WRKSRC}/john.doc ${PREFIX}/share/doc/john
+.endif
+
+.include <bsd.port.mk>
diff --git a/security/john/distinfo b/security/john/distinfo
new file mode 100644
index 0000000..1f56928
--- /dev/null
+++ b/security/john/distinfo
@@ -0,0 +1 @@
+MD5 (ucfjohn3.zip) = d55dce4c3b25cfec60df01e3ef12b545
diff --git a/security/john/pkg-comment b/security/john/pkg-comment
new file mode 100644
index 0000000..a81ac02
--- /dev/null
+++ b/security/john/pkg-comment
@@ -0,0 +1 @@
+featureful Unix password cracker
diff --git a/security/john/pkg-descr b/security/john/pkg-descr
new file mode 100644
index 0000000..45e81c2
--- /dev/null
+++ b/security/john/pkg-descr
@@ -0,0 +1,11 @@
+John the Ripper is a UNIX password cracker, currently available for UNIX
+(tested with Linux x86, FreeBSD x86, Solaris 2.x SPARC, OSF/1 Alpha), DOS,
+WinNT/Win95.
+
+ John the Ripper supports the following cracking modes:
+ - wordlist with or without rules;
+ - "single crack", makes use of the login/GECOS information;
+ - incremental, tries all character combinations;
+ - external, allows you to define your own cracking mode.
+ - MD5 based password files support
+
diff --git a/security/john/pkg-message b/security/john/pkg-message
new file mode 100644
index 0000000..f8a5a51
--- /dev/null
+++ b/security/john/pkg-message
@@ -0,0 +1,2 @@
+Before running John the Ripper, copy <install_path>/share/ucfjohn/john.ini
+to the current directory.
diff --git a/security/john/pkg-plist b/security/john/pkg-plist
new file mode 100644
index 0000000..6ef830e
--- /dev/null
+++ b/security/john/pkg-plist
@@ -0,0 +1,9 @@
+bin/john
+bin/xtract
+bin/unshadow
+share/ucfjohn/all.chr
+share/ucfjohn/alpha.chr
+share/ucfjohn/digits.chr
+share/ucfjohn/john.ini
+share/ucfjohn/password.lst
+share/doc/ucfjohn/john.doc
OpenPOWER on IntegriCloud