Date: Tue, 5 Dec 2017 19:12:08 +0000 (UTC) From: Yuri Victorovich <yuri@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r455607 - in head/security: . libhijack Message-ID: <201712051912.vB5JC8U4062213@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: yuri Date: Tue Dec 5 19:12:08 2017 New Revision: 455607 URL: https://svnweb.freebsd.org/changeset/ports/455607 Log: New port: security/libhijack: Runtime process infection made easy PR: 221322 Submitted by: Shawn Webb <shawn.webb@hardenedbsd.org> Approved by: tcberner (mentor) Differential Revision: https://reviews.freebsd.org/D13256 Added: head/security/libhijack/ head/security/libhijack/Makefile (contents, props changed) head/security/libhijack/distinfo (contents, props changed) head/security/libhijack/pkg-descr (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Tue Dec 5 19:11:21 2017 (r455606) +++ head/security/Makefile Tue Dec 5 19:12:08 2017 (r455607) @@ -335,6 +335,7 @@ SUBDIR += libgnomesu SUBDIR += libgpg-error SUBDIR += libgringotts + SUBDIR += libhijack SUBDIR += libident SUBDIR += libkpass SUBDIR += libksba Added: head/security/libhijack/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/libhijack/Makefile Tue Dec 5 19:12:08 2017 (r455607) @@ -0,0 +1,31 @@ +# $FreeBSD$ + +PORTNAME= libhijack +DISTVERSIONPREFIX= v +DISTVERSION= 0.8.0-1 +DISTVERSIONSUFFIX= -g50804aa +CATEGORIES= security + +MAINTAINER= shawn.webb@hardenedbsd.org +COMMENT= Runtime process infection made easy + +LICENSE= BSD2CLAUSE +LICENSE_FILE= ${WRKSRC}/LICENSE + +ONLY_FOR_ARCHS= aarch64 amd64 + +USE_GITHUB= yes +GH_ACCOUNT= SoldierX +USE_LDCONFIG= yes + +PLIST_FILES= include/hijack.h \ + lib/libhijack.so \ + lib/libhijack.so.1 \ + sbin/hijack + +do-install: # the original install fails: https://github.com/SoldierX/libhijack/issues/6 + ${INSTALL_DATA} ${WRKSRC}/include/hijack.h ${STAGEDIR}${PREFIX}/include + ${INSTALL_LIB} ${WRKSRC}/libhijack/obj/libhijack.so* ${STAGEDIR}${PREFIX}/lib + ${INSTALL_PROGRAM} ${WRKSRC}/hijack/obj/hijack ${STAGEDIR}${PREFIX}/sbin + +.include <bsd.port.mk> Added: head/security/libhijack/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/libhijack/distinfo Tue Dec 5 19:12:08 2017 (r455607) @@ -0,0 +1,3 @@ +TIMESTAMP = 1511722136 +SHA256 (SoldierX-libhijack-v0.8.0-1-g50804aa_GH0.tar.gz) = ec5ca09c1cad69d846c7fc6b12c04f184aeecd69acf636511ec89a4db231368e +SIZE (SoldierX-libhijack-v0.8.0-1-g50804aa_GH0.tar.gz) = 21060 Added: head/security/libhijack/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/libhijack/pkg-descr Tue Dec 5 19:12:08 2017 (r455607) @@ -0,0 +1,6 @@ +Libhijack is a tool that enables easy injection of arbitrary code during +runtime. Injection is done into newly-created anonymous memory mappings, +providing stealth. An API is provided for hooking the PLT/GOT, hence the +"hijack" part of libhijack. + +WWW: https://github.com/SoldierX/libhijack
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201712051912.vB5JC8U4062213>