<?xml version="1.0" ?>
<!DOCTYPE PISI SYSTEM "http://www.pisilinux.org/projeler/pisi/pisi-spec.dtd">
<PISI>
    <Source>
        <Name>asleap</Name>
        <Homepage>http://www.willhackforsushi.com/?page_id=41</Homepage>
        <Packager>
            <Name>İbrahim KARAGÜZEL</Name>
            <Email>karaguzelibrahim@gmail.com</Email>
        </Packager>
        <License>GPLv2</License>
        <PartOf>network</PartOf>
        <IsA>app:console</IsA>
        <Summary>Actively recover LEAP/PPTP passwords</Summary>
        <Description>Demonstrates a serious deficiency in proprietary Cisco LEAP networks. Since LEAP uses a variant of MS-CHAPv2 for the authentication exchange, it is susceptible to accelerated offline dictionary attacks. Asleap can also attack the Point-to-Point Tunneling Protocol (PPTP), and any MS-CHAPv2 exchange where you can specify the challenge and response values on the command line.</Description>
        <BuildDependencies>
            <Dependency>libpcap-devel</Dependency>
            <Dependency>openssl-devel</Dependency>
        </BuildDependencies>
        <Archive sha1sum="5781cf462adc3e35b98c4aaa18c082c17fede0fa" type="targz">http://www.willhackforsushi.com/code/asleap/2.2/asleap-2.2.tgz</Archive>
    </Source>
    <Package>
        <Name>asleap</Name>
        <Summary>Actively recover LEAP/PPTP passwords</Summary>
        <RuntimeDependencies>
            <Dependency>libpcap</Dependency>
            <Dependency>openssl</Dependency>
        </RuntimeDependencies>
        <Files>
            <Path fileType="executable">/usr/bin</Path>
            <Path fileType="doc">/usr/share/doc</Path>
            <Path fileType="man">/usr/share/man</Path>
        </Files>
    </Package>
    <History>
        <Update release="1">
            <Date>2016-02-11</Date>
            <Version>2.2</Version>
            <Comment>First Pisi Built</Comment>
            <Name>İbrahim KARAGÜZEL</Name>
            <Email>karaguzelibrahim@gmail.com</Email>
        </Update>
    </History>
</PISI>
