Date: Fri, 06 May 2016 09:10:18 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 209323] [new port]:security/dotdotpwn : fuzzer to discover traversal directory vulnerabilities Message-ID: <bug-209323-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D209323 Bug ID: 209323 Summary: [new port]:security/dotdotpwn : fuzzer to discover traversal directory vulnerabilities Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: rihaz.jerrin@gmail.com Created attachment 170039 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D170039&action= =3Dedit [new port]:security/dotdotpwn port file DotDotPwn - The Directory Traversal Fuzzer It's a very flexible intelligent=20 fuzzer to discover traversal directory=20 vulnerabilities in software such as HTTP/FTP/TFTP=20 servers, Web platforms such as CMSs,=20 ERPs, Blogs, etc.=20 Also, it has a protocol-independent=20 module to send the desired payload to=20 the host and port specified. On the=20 other hand, it also could be used in=20 a scripting way using the STDOUT module. It's written in perl programming=20 language and can be run either under=20 *NIX or Windows platforms. WWW:https://github.com/wireghoul/dotdotpwn --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-209323-13>