FreeBSD Bugzilla – Attachment 169226 Details for
Bug 208732
[new port] net-mgmt/dnsmap : DNS domain name brute forcing tool
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
dnsmap port file
dnsmap.shar (text/plain), 3.89 KB, created by
Rihaz Jerrin
on 2016-04-12 00:11:43 UTC
(
hide
)
Description:
dnsmap port file
Filename:
MIME Type:
Creator:
Rihaz Jerrin
Created:
2016-04-12 00:11:43 UTC
Size:
3.89 KB
patch
obsolete
># This is a shell archive. Save it in a file, remove anything before ># this line, and then unpack it by entering "sh file". Note, it may ># create directories; files and directories will be owned by you and ># have default permissions. ># ># This archive contains: ># ># dnsmap ># dnsmap/Makefile ># dnsmap/distinfo ># dnsmap/pkg-descr ># dnsmap/pkg-plist ># dnsmap/files ># dnsmap/files/patch-Makefile ># dnsmap/files/patch-dnsmap-bulk.sh ># >echo c - dnsmap >mkdir -p dnsmap > /dev/null 2>&1 >echo x - dnsmap/Makefile >sed 's/^X//' >dnsmap/Makefile << 'b3525a4c25d7c76b01c330961001b295' >X# $FreeBSD$ >X >XPORTNAME= dnsmap >XPORTVERSION= 0.30 >XCATEGORIES= net-mgmt >XMASTER_SITES= https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/dnsmap/ >X >XMAINTAINER= rihaz.jerrin@gmail.com >XCOMMENT= DNS domain name brute forcing tool >X >XLICENSE= GPLv2 >X >XPORTDOCS= Changelog.txt README.txt CREDITS.txt use_cases.txt >X >Xdo-install: >X ${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin/${PORTNAME} >X ${INSTALL_SCRIPT} ${WRKSRC}/${PORTNAME}-bulk.sh ${STAGEDIR}${PREFIX}/bin/${PORTNAME}-bulk >X ${MKDIR} ${STAGEDIR}${DATADIR} >X ${INSTALL_DATA} ${WRKSRC}/wordlist_TLAs.txt ${STAGEDIR}${DATADIR} >X ${MKDIR} ${STAGEDIR}${DOCSDIR} >X ${INSTALL_DATA} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR} >X >X.include <bsd.port.mk> >b3525a4c25d7c76b01c330961001b295 >echo x - dnsmap/distinfo >sed 's/^X//' >dnsmap/distinfo << '0294ad798be782d0739daadfbee7cda4' >XSHA256 (dnsmap-0.30.tar.gz) = fcf03a7b269b51121920ac49f7d450241306cfff23c76f3da94b03792f6becbc >XSIZE (dnsmap-0.30.tar.gz) = 59929 >0294ad798be782d0739daadfbee7cda4 >echo x - dnsmap/pkg-descr >sed 's/^X//' >dnsmap/pkg-descr << '0f49c815ceb0b00c953eac4d2ead43a2' >Xdnsmap was originally released back in 2006 and >Xwas inspired by the fictional story "The Thief >XNo One Saw" by Paul Craig, which can be found >Xin the book "Stealing the Network - How to 0wn the Box". >X >Xdnsmap is mainly meant to be used by pentesters >Xduring the information gathering/enumeration phase >Xof infrastructure security assessments. During the >Xenumeration stage, the security consultant would >Xtypically discover the target company's IP netblocks, >Xdomain names, phone numbers, etc ... >X >X >XSubdomain brute-forcing is another technique that >Xshould be used in the enumeration stage, as it's >Xespecially useful when other domain enumeration >Xtechniques such as zone transfers don't work. >X >XWWW: http://code.google.com/p/dnsmap/ >0f49c815ceb0b00c953eac4d2ead43a2 >echo x - dnsmap/pkg-plist >sed 's/^X//' >dnsmap/pkg-plist << 'a4cea62ea3f267c547f6c28ccdbe298f' >Xbin/dnsmap >Xbin/dnsmap-bulk >X%%DATADIR%%/wordlist_TLAs.txt >a4cea62ea3f267c547f6c28ccdbe298f >echo c - dnsmap/files >mkdir -p dnsmap/files > /dev/null 2>&1 >echo x - dnsmap/files/patch-Makefile >sed 's/^X//' >dnsmap/files/patch-Makefile << '691a9d1f64c2becffba6c321a0315cc6' >X--- Makefile.orig 2010-02-21 11:39:40 UTC >X+++ Makefile >X@@ -1,12 +1,5 @@ >X-CC=gcc >X-CFLAGS=-I. >X-BINDIR=/usr/local/bin >X >X-dnsmap: dnsmap.c dnsmap.h >X- $(CC) $(CFLAGS) -o dnsmap dnsmap.c >X+all: >X+ cc -O3 -Wall dnsmap.c -o dnsmap >X >X-install: dnsmap >X- mkdir -p $(DESTDIR)$(BINDIR) >X- install -m 0755 dnsmap $(DESTDIR)$(BINDIR) >X- install -m 0755 dnsmap-bulk.sh $(DESTDIR)$(BINDIR)/dnsmap-bulk >X >691a9d1f64c2becffba6c321a0315cc6 >echo x - dnsmap/files/patch-dnsmap-bulk.sh >sed 's/^X//' >dnsmap/files/patch-dnsmap-bulk.sh << '2492f4dee0ec6135fc6b511e75efcaaf' >X--- dnsmap-bulk.sh.orig 2016-04-11 23:06:01 UTC >X+++ dnsmap-bulk.sh >X@@ -1,5 +1,5 @@ >X-#!/bin/bash >X-if [[ $# -ne 1 && $# -ne 2 ]] >X+#!/bin/sh >X+if [ $# -ne 1 -a $# -ne 2 ] >X then >X echo "usage: `basename $0` <domains-file> [results-path]"; >X echo "e.g.:"; >X@@ -9,10 +9,10 @@ then >X fi >X for i in `cat $1` >X do >X- if [[ $# -eq 1 ]] >X+ if [ $# -eq 1 ] >X then >X dnsmap $i >X- elif [[ $# -eq 2 ]] >X+ elif [ $# -eq 2 ] >X then >X dnsmap $i -r $2 >X fi >2492f4dee0ec6135fc6b511e75efcaaf >exit >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 208732
: 169226 |
178575