Date: Thu, 13 Jul 2017 09:00:22 +0000 (UTC) From: Dmitry Marakasov <amdmi3@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r445638 - head/net-mgmt/dnsmap Message-ID: <201707130900.v6D90MfW072239@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: amdmi3 Date: Thu Jul 13 09:00:21 2017 New Revision: 445638 URL: https://svnweb.freebsd.org/changeset/ports/445638 Log: - Fix LICENSE - Add LICENSE_FILE - Update WWW - Cleanup trailing whitespace in pkg-descr Approved by: portmgr blanket Modified: head/net-mgmt/dnsmap/Makefile head/net-mgmt/dnsmap/pkg-descr Modified: head/net-mgmt/dnsmap/Makefile ============================================================================== --- head/net-mgmt/dnsmap/Makefile Thu Jul 13 08:20:35 2017 (r445637) +++ head/net-mgmt/dnsmap/Makefile Thu Jul 13 09:00:21 2017 (r445638) @@ -9,7 +9,8 @@ CATEGORIES= net-mgmt MAINTAINER= rihaz.jerrin@gmail.com COMMENT= DNS domain name brute forcing tool -LICENSE= GPLv2 +LICENSE= GPLv2+ +LICENSE_FILE= ${WRKSRC}/gpl-2.0.txt USE_GITHUB= yes GH_ACCOUNT= lifanov Modified: head/net-mgmt/dnsmap/pkg-descr ============================================================================== --- head/net-mgmt/dnsmap/pkg-descr Thu Jul 13 08:20:35 2017 (r445637) +++ head/net-mgmt/dnsmap/pkg-descr Thu Jul 13 09:00:21 2017 (r445638) @@ -1,18 +1,18 @@ -dnsmap was originally released back in 2006 and -was inspired by the fictional story "The Thief -No One Saw" by Paul Craig, which can be found +dnsmap was originally released back in 2006 and +was inspired by the fictional story "The Thief +No One Saw" by Paul Craig, which can be found in the book "Stealing the Network - How to 0wn the Box". -dnsmap is mainly meant to be used by pentesters -during the information gathering/enumeration phase -of infrastructure security assessments. During the -enumeration stage, the security consultant would +dnsmap is mainly meant to be used by pentesters +during the information gathering/enumeration phase +of infrastructure security assessments. During the +enumeration stage, the security consultant would typically discover the target company's IP netblocks, domain names, phone numbers, etc ... -Subdomain brute-forcing is another technique that -should be used in the enumeration stage, as it's -especially useful when other domain enumeration +Subdomain brute-forcing is another technique that +should be used in the enumeration stage, as it's +especially useful when other domain enumeration techniques such as zone transfers don't work. -WWW: http://tools.kali.org/information-gathering/dnsmap +WWW: https://tools.kali.org/information-gathering/dnsmap
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201707130900.v6D90MfW072239>