1 | # $Id$ |
---|
2 | |
---|
3 | PortSystem 1.0 |
---|
4 | name ophcrack |
---|
5 | version 2.3.3 |
---|
6 | categories security |
---|
7 | maintainers cedric.luthi@gmail.com |
---|
8 | description Microsoft Windows password cracker |
---|
9 | long_description Ophcrack is a Windows password cracker based on a time-memory \ |
---|
10 | trade-off using rainbow tables. This is a new variant of Hellman's \ |
---|
11 | original trade-off, with better performance. It recovers 99.9% of \ |
---|
12 | alphanumeric passwords in seconds. |
---|
13 | |
---|
14 | homepage http://ophcrack.sourceforge.net |
---|
15 | master_sites sourceforge |
---|
16 | checksums md5 33eb0e14ab5a196ac168795e38856b8b \ |
---|
17 | sha1 dc83eb2a3d016eee272192e258c860e733538a8e \ |
---|
18 | rmd160 6cc9317f6c24c4d1bfa3a7b348eb759a8b0cac81 |
---|
19 | |
---|
20 | depends_lib port:gtk2 |
---|
21 | patchfiles patch-Makefile.in |
---|
22 | post-main { |
---|
23 | if { [string compare ${os.arch} "i386"] != 0 } { |
---|
24 | ui_error "${name} only runs on intel machines." |
---|
25 | exit 1 |
---|
26 | } |
---|
27 | } |
---|
28 | post-destroot { |
---|
29 | # these are ELF executables for Linux |
---|
30 | file delete ${prefix}/bin/bkhive2 |
---|
31 | file delete ${prefix}/bin/samdump2 |
---|
32 | } |
---|
33 | post-activate { |
---|
34 | ui_msg "****************************************************" |
---|
35 | ui_msg "" |
---|
36 | ui_msg "Don't forget to download the tables from" |
---|
37 | ui_msg "http://lasecwww.epfl.ch/SSTIC04-10k.zip" |
---|
38 | ui_msg "or http://lasecwww.epfl.ch/SSTIC04-5k.zip" |
---|
39 | ui_msg "" |
---|
40 | ui_msg "and install them in ${prefix}/share/ophcrack/10000" |
---|
41 | ui_msg "or ${prefix}/share/ophcrack/5000" |
---|
42 | ui_msg "" |
---|
43 | ui_msg "SSTIC04-10k (388MB), for PCs with at least 256MB of RAM." |
---|
44 | ui_msg "SSTIC04-5k (720MB), for PCs with at least 512MB of RAM." |
---|
45 | ui_msg "" |
---|
46 | ui_msg "****************************************************" |
---|
47 | } |
---|