Date: 19 Oct 2004 20:50:30 -0000 From: David Thiel <lx@redundancy.redundancy.org> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/72898: New port: security/dnshijacker, a tool to fake DNS responses Message-ID: <20041019205030.19160.qmail@redundancy.redundancy.org> Resent-Message-ID: <200410192050.i9JKoQ4J008157@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 72898 >Category: ports >Synopsis: New port: security/dnshijacker, a tool to fake DNS responses >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Tue Oct 19 20:50:25 GMT 2004 >Closed-Date: >Last-Modified: >Originator: David Thiel >Release: FreeBSD 4.9-STABLE i386 >Organization: >Environment: System: FreeBSD redundancy.redundancy.org 4.9-STABLE FreeBSD 4.9-STABLE #15: Wed Nov 19 21:41:32 PST 2003 lx@redundancy.redundancy.org:/usr/obj/usr/src/sys/REDUNDANCY i386 >Description: dnshijacker is a libnet/libpcap based packet sniffer & spoofer. a versatile tool, dnshijacker supports tcpdump style filters that allow you to specifically target victims. dns answers are forged based on entries in a "fabrication table" or by simply forging one answer to all requests. a print only mode is also supported, allowing one to simply monitor dns traffic. dns hijacker is an excellent tool for network level ad blocking / removal. >How-To-Repeat: >Fix: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # dnshijacker # dnshijacker/Makefile # dnshijacker/distinfo # dnshijacker/pkg-descr # echo c - dnshijacker mkdir -p dnshijacker > /dev/null 2>&1 echo x - dnshijacker/Makefile sed 's/^X//' >dnshijacker/Makefile << 'END-of-dnshijacker/Makefile' X# New ports collection makefile for: dnshijacker X# Date created: 2004-10-19 X# Whom: lx@redundancy.redundancy.org X# X# $FreeBSD$ X# X XPORTNAME= dnshijacker XPORTVERSION= 1.3 XCATEGORIES= security XMASTER_SITES= http://pedram.redhive.com/downloads/ X XMAINTAINER= lx@redundancy.redundancy.org XCOMMENT= A tool to hijack DNS requests X XBUILD_DEPENDS= ${LOCALBASE}/lib/libnet.a:${PORTSDIR}/net/libnet X XLDFLAGS+= -lpcap -lnet X XPLIST_FILES= bin/dnshijacker XPORTDOCS= README X Xdo-build: X cd ${WRKSRC} && \ X ${CC} ${PORTNAME}.c ${CFLAGS} -I${LOCALBASE}/include \ X -L${LOCALBASE}/lib ${LDFLAGS} `libnet-config --defines` \ X `libnet-config --cflags` -o ${PORTNAME} X Xdo-install: X ${INSTALL_PROGRAM} ${WRKSRC}/dnshijacker ${PREFIX}/bin X X.include <bsd.port.mk> END-of-dnshijacker/Makefile echo x - dnshijacker/distinfo sed 's/^X//' >dnshijacker/distinfo << 'END-of-dnshijacker/distinfo' XMD5 (dnshijacker-1.3.tar.gz) = 6b99d105fc78d84e963661ae7bf4c06d XSIZE (dnshijacker-1.3.tar.gz) = 23561 END-of-dnshijacker/distinfo echo x - dnshijacker/pkg-descr sed 's/^X//' >dnshijacker/pkg-descr << 'END-of-dnshijacker/pkg-descr' Xdnshijacker is a libnet/libpcap based packet sniffer & spoofer. a Xversatile tool, dnshijacker supports tcpdump style filters that allow Xyou to specifically target victims. dns answers are forged based on Xentries in a "fabrication table" or by simply forging one answer to all Xrequests. a print only mode is also supported, allowing one to simply Xmonitor dns traffic. dns hijacker is an excellent tool for network level Xad blocking / removal. X XWWW: http://pedram.redhive.com/projects.php END-of-dnshijacker/pkg-descr exit >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20041019205030.19160.qmail>