From owner-svn-ports-head@freebsd.org Wed Dec 7 21:29:37 2016 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BA04CC6BED6; Wed, 7 Dec 2016 21:29:37 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 702D0DE4; Wed, 7 Dec 2016 21:29:37 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uB7LTaVp075990; Wed, 7 Dec 2016 21:29:36 GMT (envelope-from pi@FreeBSD.org) Received: (from pi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uB7LTZKf075983; Wed, 7 Dec 2016 21:29:35 GMT (envelope-from pi@FreeBSD.org) Message-Id: <201612072129.uB7LTZKf075983@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pi set sender to pi@FreeBSD.org using -f From: Kurt Jaeger Date: Wed, 7 Dec 2016 21:29:35 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r428087 - in head/security: . dotdotpwn dotdotpwn/files X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Dec 2016 21:29:37 -0000 Author: pi Date: Wed Dec 7 21:29:35 2016 New Revision: 428087 URL: https://svnweb.freebsd.org/changeset/ports/428087 Log: New port: security/dotdotpwn DotDotPwn - The Directory Traversal Fuzzer It's a very flexible intelligent fuzzer to discover traversal directory vulnerabilities in software such as HTTP/FTP/TFTP servers, Web platforms such as CMSs, ERPs, Blogs, etc. Also, it has a protocol-independent module to send the desired payload to the host and port specified. On the other hand, it also could be used in a scripting way using the STDOUT module. It's written in perl programming language and can be run either under *NIX or Windows platforms. WWW: https://github.com/wireghoul/dotdotpwn PR: 209323 Submitted by: Rihaz Jerrin Added: head/security/dotdotpwn/ head/security/dotdotpwn/Makefile (contents, props changed) head/security/dotdotpwn/distinfo (contents, props changed) head/security/dotdotpwn/files/ head/security/dotdotpwn/files/patch-DotDotPwn_HTTP.pm (contents, props changed) head/security/dotdotpwn/files/patch-DotDotPwn_HTTP__Url.pm (contents, props changed) head/security/dotdotpwn/pkg-descr (contents, props changed) head/security/dotdotpwn/pkg-plist (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Wed Dec 7 20:38:28 2016 (r428086) +++ head/security/Makefile Wed Dec 7 21:29:35 2016 (r428087) @@ -115,6 +115,7 @@ SUBDIR += doas SUBDIR += doorman SUBDIR += doscan + SUBDIR += dotdotpwn SUBDIR += dradis SUBDIR += dropbear SUBDIR += dsniff Added: head/security/dotdotpwn/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/dotdotpwn/Makefile Wed Dec 7 21:29:35 2016 (r428087) @@ -0,0 +1,48 @@ +# $FreeBSD$ + +PORTNAME= dotdotpwn +PORTVERSION= 3.0.2 +CATEGORIES= security +MASTER_SITES= GH + +MAINTAINER= rihaz.jerrin@gmail.com +COMMENT= Fuzzer to discover traversal directory vulnerabilities + +LICENSE= LGPL21 + +RUN_DEPENDS= p5-Time-HiRes>=0:devel/p5-Time-HiRes \ + p5-Switch>=0:lang/p5-Switch \ + p5-libwww>=0:www/p5-libwww \ + p5-TFTP>=0:net/p5-TFTP + +USE_GITHUB= yes +GH_ACCOUNT= wireghoul + +OPTIONS_DEFINE= NMAP +OPTIONS_SUB= yes +NMAP_DESC= ENABLE OS DETECTION FEATURE - REQUIRES NMAP +OPTIONS_DEFAULT= NMAP + +OSDETECTION_RUN_DEPENDS= nmap:${PORTSDIR}/security/nmap + +USES= perl5 shebangfix + +SHEBANG_FILES= ${WRKSRC}/dotdotpwn.pl ${WRKSRC}/DotDotPwn/BisectionAlgorithm.pm ${WRKSRC}/DotDotPwn/FTP.pm ${WRKSRC}/DotDotPwn/File.pm ${WRKSRC}/DotDotPwn/Fingerprint.pm ${WRKSRC}/DotDotPwn/HTTP.pm ${WRKSRC}/DotDotPwn/HTTP_Url.pm ${WRKSRC}/DotDotPwn/Payload.pm ${WRKSRC}/DotDotPwn/STDOUT.pm ${WRKSRC}/DotDotPwn/TFTP.pm ${WRKSRC}/DotDotPwn/TraversalEngine.pm + +NO_BUILD= yes +NO_ARCH= yes + +PORTDOCS= README.txt TODO.txt CHANGELOG.txt LICENSE.txt AUTHORS.txt EXAMPLES.txt + +do-install: + ${INSTALL_SCRIPT} ${WRKSRC}/dotdotpwn.pl ${STAGEDIR}${PREFIX}/bin/dotdotpwn + ${MKDIR} ${STAGEDIR}${PREFIX}/${SITE_PERL_REL}/DotDotPwn + ${MKDIR} ${STAGEDIR}${DATADIR}/DotDotPwn + (cd ${WRKSRC}/DotDotPwn && ${COPYTREE_SHARE} \* ${STAGEDIR}${PREFIX}/${SITE_PERL_REL}/DotDotPwn) + ${MKDIR} ${STAGEDIR}${DOCSDIR} + ${INSTALL_DATA} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR} + ${INSTALL_DATA} ${WRKSRC}/DotDotPwn/User-Agents.txt ${STAGEDIR}${DATADIR} + ${INSTALL_DATA} ${WRKSRC}/payload_sample_1.txt ${STAGEDIR}${DATADIR} + ${INSTALL_DATA} ${WRKSRC}/payload_sample_2.txt ${STAGEDIR}${DATADIR} + +.include Added: head/security/dotdotpwn/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/dotdotpwn/distinfo Wed Dec 7 21:29:35 2016 (r428087) @@ -0,0 +1,3 @@ +TIMESTAMP = 1480965191 +SHA256 (wireghoul-dotdotpwn-3.0.2_GH0.tar.gz) = a74b4010a6171cc58d9881b0f2b1b0ac1f4f637386a0cbc62463e7ae227981d5 +SIZE (wireghoul-dotdotpwn-3.0.2_GH0.tar.gz) = 50440 Added: head/security/dotdotpwn/files/patch-DotDotPwn_HTTP.pm ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/dotdotpwn/files/patch-DotDotPwn_HTTP.pm Wed Dec 7 21:29:35 2016 (r428087) @@ -0,0 +1,11 @@ +--- DotDotPwn/HTTP.pm.orig 2016-05-05 08:37:25 UTC ++++ DotDotPwn/HTTP.pm +@@ -21,7 +21,7 @@ sub FuzzHTTP{ + my $foo = 0; # Used as an auxiliary variable in quiet mode (see below) + my $UserAgent; + +- open(AGENTS, "DotDotPwn/User-Agents.txt") or die "[-] Cannot open User-Agents.txt file: $!"; ++ open(AGENTS, "/usr/local/share/dotdotpwn/User-Agents.txt") or die "[-] Cannot open User-Agents.txt file: $!"; + my @UserAgents = ; + close(AGENTS); + Added: head/security/dotdotpwn/files/patch-DotDotPwn_HTTP__Url.pm ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/dotdotpwn/files/patch-DotDotPwn_HTTP__Url.pm Wed Dec 7 21:29:35 2016 (r428087) @@ -0,0 +1,11 @@ +--- DotDotPwn/HTTP_Url.pm.orig 2016-05-05 08:38:21 UTC ++++ DotDotPwn/HTTP_Url.pm +@@ -29,7 +29,7 @@ sub FuzzHTTP_Url{ + my $foo = 0; # Used as an auxiliary variable in quiet mode (see below) + my $UserAgent; + +- open(AGENTS, "DotDotPwn/User-Agents.txt") or die "[-] Cannot open User-Agents.txt file: $!"; ++ open(AGENTS, "/usr/local/share/dotdotpwn/User-Agents.txt") or die "[-] Cannot open User-Agents.txt file: $!"; + my @UserAgents = ; + close(AGENTS); + Added: head/security/dotdotpwn/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/dotdotpwn/pkg-descr Wed Dec 7 21:29:35 2016 (r428087) @@ -0,0 +1,19 @@ +DotDotPwn - The Directory Traversal Fuzzer + +It's a very flexible intelligent +fuzzer to discover traversal directory +vulnerabilities in software such as HTTP/FTP/TFTP +servers, Web platforms such as CMSs, +ERPs, Blogs, etc. + +Also, it has a protocol-independent +module to send the desired payload to +the host and port specified. On the +other hand, it also could be used in +a scripting way using the STDOUT module. + +It's written in perl programming +language and can be run either under +*NIX or Windows platforms. + +WWW: https://github.com/wireghoul/dotdotpwn Added: head/security/dotdotpwn/pkg-plist ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/dotdotpwn/pkg-plist Wed Dec 7 21:29:35 2016 (r428087) @@ -0,0 +1,16 @@ +bin/dotdotpwn +%%SITE_PERL%%/DotDotPwn/BisectionAlgorithm.pm +%%SITE_PERL%%/DotDotPwn/FTP.pm +%%SITE_PERL%%/DotDotPwn/File.pm +%%SITE_PERL%%/DotDotPwn/Fingerprint.pm +%%SITE_PERL%%/DotDotPwn/HTTP.pm +%%SITE_PERL%%/DotDotPwn/HTTP_Url.pm +%%SITE_PERL%%/DotDotPwn/Payload.pm +%%SITE_PERL%%/DotDotPwn/STDOUT.pm +%%SITE_PERL%%/DotDotPwn/TFTP.pm +%%SITE_PERL%%/DotDotPwn/TraversalEngine.pm +%%DATADIR%%/User-Agents.txt +%%DATADIR%%/payload_sample_1.txt +%%DATADIR%%/payload_sample_2.txt +%%SITE_PERL%%/DotDotPwn/User-Agents.txt +@dir %%DATADIR%%/DotDotPwn