1 # Maintainer: fnord0 <fnord0 at riseup dot net>
2 pkgname=cisco-global-exploiter
5 pkgdesc="A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products."
7 url="http://www.blackangels.it"
10 source=(http://packetstormsecurity.org/0405-exploits/cge-13.tar.gz)
11 md5sums=(a236f742c3976c9864d84d55eb11ea7e)
15 install -d ${startdir}/pkg/usr/bin || return 1
16 install -d ${startdir}/pkg/usr/share/${pkgname}/doc || return 1
17 install -Dm755 ${startdir}/cge ${startdir}/pkg/usr/bin/cge || return 1
18 install -Dm755 cge.pl ${startdir}/pkg/usr/share/${pkgname}/cge.pl || return 1
19 install -Dm644 Readme ${startdir}/pkg/usr/share/${pkgname}/${doc} || return 1
21 for doc in Changelog Documentation; do
22 install -Dm644 ${doc} ${startdir}/pkg/usr/share/${pkgname}/doc/${doc} || return 1
24 msg "The cisco-global-exploiter script is avaiable at the directory '/usr/share/cisco-global-exploiter' and, is called from '/usr/bin/cge'"