Update to 3.4.0
lots of new things in here, switch to new GH_ACCOUNT takeover MAINTAINER OK gonzalo@, awolk@ (former MAINTAINER)
This commit is contained in:
parent
ad873fa1d9
commit
203e00d74f
@ -1,33 +1,28 @@
|
||||
# $OpenBSD: Makefile,v 1.2 2019/07/12 20:49:36 sthen Exp $
|
||||
# $OpenBSD: Makefile,v 1.3 2019/09/05 08:33:27 sebastia Exp $
|
||||
|
||||
COMMENT = The Router Exploitation Framework
|
||||
|
||||
MODPY_EGG_VERSION = 2.1.0
|
||||
GH_ACCOUNT = reverse-shell
|
||||
MODPY_EGG_VERSION = 3.4.0
|
||||
GH_ACCOUNT = threat9
|
||||
GH_PROJECT = routersploit
|
||||
GH_TAGNAME = v${MODPY_EGG_VERSION}
|
||||
|
||||
CATEGORIES = security net
|
||||
|
||||
MAINTAINER = Adam Wolk <awolk@openbsd.org>
|
||||
MAINTAINER = Sebastian Reitenbach <sebastia@openbsd.org>
|
||||
|
||||
# BSD
|
||||
PERMIT_PACKAGE = Yes
|
||||
|
||||
MODULES = lang/python
|
||||
MODPY_VERSION = ${MODPY_DEFAULT_VERSION_3}
|
||||
MODPY_SETUPTOOLS = Yes
|
||||
RUN_DEPENDS = net/py-snmp \
|
||||
security/py-paramiko \
|
||||
www/py-beautifulsoup4 \
|
||||
www/py-requests
|
||||
RUN_DEPENDS = devel/py-future${MODPY_FLAVOR} \
|
||||
net/py-snmp${MODPY_FLAVOR} \
|
||||
security/py-cryptodome${MODPY_FLAVOR} \
|
||||
security/py-paramiko${MODPY_FLAVOR} \
|
||||
www/py-requests${MODPY_FLAVOR}
|
||||
|
||||
NO_TEST = Yes
|
||||
|
||||
pre-configure:
|
||||
@sed -i 's,routersploit/modules,${MODPY_SITEPKG}/routersploit/modules,' \
|
||||
${WRKSRC}/routersploit/modules/scanners/{autopwn,dlink_scan}.py
|
||||
@sed -i 's,routersploit/modules,${MODPY_SITEPKG}/routersploit/modules,' \
|
||||
${WRKSRC}/routersploit/utils.py
|
||||
@cp ${FILESDIR}/setup.py ${WRKSRC}
|
||||
|
||||
.include <bsd.port.mk>
|
||||
|
@ -1,2 +1,2 @@
|
||||
SHA256 (routersploit-2.1.0.tar.gz) = qWgntxh4vy/wEPZfW7zzRk55Ve0h3Q01hUhj0VRFh9E=
|
||||
SIZE (routersploit-2.1.0.tar.gz) = 46498
|
||||
SHA256 (routersploit-3.4.0.tar.gz) = 81FJd158jB/e0J844dFXVVvnDRDsgSFspFeV03WYyAI=
|
||||
SIZE (routersploit-3.4.0.tar.gz) = 465082
|
||||
|
@ -1,19 +0,0 @@
|
||||
# $OpenBSD: setup.py,v 1.1.1.1 2016/07/04 21:02:08 awolk Exp $
|
||||
|
||||
from setuptools import find_packages, setup
|
||||
import sys, os
|
||||
|
||||
setup(
|
||||
name = "routersploit",
|
||||
version = "2.1.0",
|
||||
description = "The Router Exploitation Framework",
|
||||
author = "Reverse Shell Security",
|
||||
author_email = "office@reverse-shell.com",
|
||||
license = "BSD",
|
||||
url = "https://github.com/reverse-shell/routersploit",
|
||||
packages=find_packages(),
|
||||
package_data = {'' : ['*.txt']},
|
||||
include_package_data = True,
|
||||
scripts = ('rsf.py',)
|
||||
)
|
||||
|
37
security/routersploit/patches/patch-rsf_py
Normal file
37
security/routersploit/patches/patch-rsf_py
Normal file
@ -0,0 +1,37 @@
|
||||
$OpenBSD: patch-rsf_py,v 1.1 2019/09/05 08:33:27 sebastia Exp $
|
||||
|
||||
change to the site-packages directory, otherwise the
|
||||
relative includes for the payloads don't work
|
||||
therefore save the routersploit.log in the home directory
|
||||
instead of current working directory
|
||||
|
||||
|
||||
Index: rsf.py
|
||||
--- rsf.py.orig
|
||||
+++ rsf.py
|
||||
@@ -1,15 +1,18 @@
|
||||
#!/usr/bin/env python3
|
||||
|
||||
from __future__ import print_function
|
||||
+from pathlib import Path
|
||||
import logging.handlers
|
||||
import sys
|
||||
+import os
|
||||
+import site
|
||||
if sys.version_info.major < 3:
|
||||
print("RouterSploit supports only Python3. Rerun application in Python3 environment.")
|
||||
exit(0)
|
||||
|
||||
from routersploit.interpreter import RoutersploitInterpreter
|
||||
|
||||
-log_handler = logging.handlers.RotatingFileHandler(filename="routersploit.log", maxBytes=500000)
|
||||
+log_handler = logging.handlers.RotatingFileHandler(filename=str(Path.home()) + "/routersploit.log", maxBytes=500000)
|
||||
log_formatter = logging.Formatter("%(asctime)s %(levelname)s %(name)s %(message)s")
|
||||
log_handler.setFormatter(log_formatter)
|
||||
LOGGER = logging.getLogger()
|
||||
@@ -23,4 +26,5 @@ def routersploit():
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
+ os.chdir(site.getsitepackages()[0])
|
||||
routersploit()
|
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user