Date: Mon, 8 Oct 2012 08:13:05 +0000 (UTC) From: Sofian Brabez <sbz@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r305520 - head/security/dsniff Message-ID: <201210080813.q988D5pK060799@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: sbz Date: Mon Oct 8 08:13:05 2012 New Revision: 305520 URL: http://svn.freebsd.org/changeset/ports/305520 Log: - Convert to new option framework - Add LICENSE - Update MASTER_SITES - Update pkg-descr Modified: head/security/dsniff/Makefile (contents, props changed) head/security/dsniff/pkg-descr (contents, props changed) Modified: head/security/dsniff/Makefile ============================================================================== --- head/security/dsniff/Makefile Mon Oct 8 07:47:13 2012 (r305519) +++ head/security/dsniff/Makefile Mon Oct 8 08:13:05 2012 (r305520) @@ -1,28 +1,31 @@ -# New ports collection makefile for: dsniff -# Date created: 08 Jan 2000 -# Whom: kris@FreeBSD.org -# +# Created by: kris@FreeBSD.org # $FreeBSD$ -# PORTNAME= dsniff PORTVERSION= 2.3 PORTREVISION= 4 CATEGORIES= security -MASTER_SITES= http://naughty.monkey.org/~dugsong/dsniff/ +MASTER_SITES= http://www.monkey.org/~dugsong/${PORTNAME}/ \ + LOCAL/sbz MAINTAINER= sbz@FreeBSD.org COMMENT= Various sniffing utilities for penetration testing +LICENSE= BSD + BUILD_DEPENDS= ${LIBNET_CONFIG}:${PORTSDIR}/net/libnet10 \ ${LOCALBASE}/lib/libnids.a:${PORTSDIR}/net/libnids GNU_CONFIGURE= yes WANT_GNOME= yes -OPTIONS= X11 "Enable X11 support" on +OPTIONS_DEFINE= X11 + +OPTIONS_DEFAULT= X11 + +.include <bsd.port.options.mk> -MAN8= arpspoof.8 dsniff.8 macof.8 mailsnarf.8 tcpkill.8 \ +MAN8= arpspoof.8 ${PORTNAME}.8 macof.8 mailsnarf.8 tcpkill.8 \ tcpnice.8 urlsnarf.8 filesnarf.8 dnsspoof.8 msgsnarf.8 \ sshmitm.8 webmitm.8 @@ -41,7 +44,7 @@ LIBNIDS_GLIB2!= nm -u ${LOCALBASE}/lib/l USE_GNOME+= glib20 .endif -.if !defined(WITHOUT_X11) +.if empty(PORT_OPTIONS:MX11) USE_XORG= x11 xmu PLIST_SUB+= X11='' MAN8+= webspy.8 Modified: head/security/dsniff/pkg-descr ============================================================================== --- head/security/dsniff/pkg-descr Mon Oct 8 07:47:13 2012 (r305519) +++ head/security/dsniff/pkg-descr Mon Oct 8 08:13:05 2012 (r305520) @@ -1,26 +1,9 @@ -Various tools for network penetration testing. Please do not abuse them. - -arpspoof redirect packets from a target host (or all hosts) on the LAN - intended for another host on the LAN by forging ARP replies. -dnsspoof forge replies to arbitrary DNS address / pointer queries on - the LAN. -dsniff simple password sniffer. -filesnarf saves selected files sniffed from NFS traffic in the current - working directory. -macof flood the local network with random MAC addresses. -mailsnarf a fast and easy way to violate the Electronic Communications - Privacy Act of 1986 (18 USC 2701-2711), be careful. -msgsnarf record selected messages from sniffed AOL Instant Messenger, - ICQ 2000, IRC, and Yahoo! Messenger chat sessions. -sshmitm SSH monkey-in-the-middle. -tcpkill kills specified in-progress TCP connections. -tcpnice slow down specified TCP connections via "active" traffic - shaping. -urlsnarf output all requested URLs sniffed from HTTP traffic in CLF - (Common Log Format, used by almost all web servers), suitable - for offline post-processing -webmitm HTTP / HTTPS monkey-in-the-middle. -webspy sends URLs sniffed from a client to your local Netscape - browser for display, a fun party trick +dsniff is a collection of tools for network auditing and penetration testing. +dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor +a network for interesting data (passwords, e-mail, files, etc.). arpspoof, +dnsspoof, and macof facilitate the interception of network traffic normally +unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm +implement active monkey-in-the-middle attacks against redirected SSH and HTTPS +sessions by exploiting weak bindings in ad-hoc PKI. WWW: http://www.monkey.org/~dugsong/dsniff/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201210080813.q988D5pK060799>