FreeBSD Bugzilla – Attachment 170039 Details for
Bug 209323
[new port]:security/dotdotpwn : fuzzer to discover traversal directory vulnerabilities
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[new port]:security/dotdotpwn port file
dotdotpwn.shar (text/plain), 5.37 KB, created by
Rihaz Jerrin
on 2016-05-06 09:10:18 UTC
(
hide
)
Description:
[new port]:security/dotdotpwn port file
Filename:
MIME Type:
Creator:
Rihaz Jerrin
Created:
2016-05-06 09:10:18 UTC
Size:
5.37 KB
patch
obsolete
># This is a shell archive. Save it in a file, remove anything before ># this line, and then unpack it by entering "sh file". Note, it may ># create directories; files and directories will be owned by you and ># have default permissions. ># ># This archive contains: ># ># dotdotpwn ># dotdotpwn/Makefile ># dotdotpwn/distinfo ># dotdotpwn/pkg-descr ># dotdotpwn/pkg-plist ># dotdotpwn/files ># dotdotpwn/files/patch-DotDotPwn_HTTP.pm ># dotdotpwn/files/patch-DotDotPwn_HTTP__Url.pm ># >echo c - dotdotpwn >mkdir -p dotdotpwn > /dev/null 2>&1 >echo x - dotdotpwn/Makefile >sed 's/^X//' >dotdotpwn/Makefile << '9c3b112b65fe0ab9cb95256ca86091e0' >X# $FreeBSD$ >X >XPORTNAME= dotdotpwn >XPORTVERSION= 3.0 >XCATEGORIES= security >XMASTER_SITES= GH >X >XMAINTAINER= rihaz.jerrin@gmail.com >XCOMMENT= Fuzzer to discover traversal directory vulnerabilities >X >XLICENSE= LGPL21 >X >XRUN_DEPENDS= p5-Time-HiRes>=0:${PORTSDIR}/devel/p5-Time-HiRes \ >X p5-Switch>=0:${PORTSDIR}/lang/p5-Switch \ >X p5-libwww>=0:${PORTSDIR}/www/p5-libwww \ >X p5-TFTP>=0:${PORTSDIR}/net/p5-TFTP >X >XUSE_GITHUB= yes >XGH_ACCOUNT= wireghoul >XGH_TAGNAME= bc7801f >X >XOPTIONS_DEFINE= NMAP >XOPTIONS_SUB= yes >XNMAP_DESC= ENABLE OS DETECTION FEATURE - REQUIRES NMAP >XOPTIONS_DEFAULT= NMAP >X >XOSDETECTION_RUN_DEPENDS= nmap:${PORTSDIR}/security/nmap >X >XUSES= perl5 shebangfix >X >XSHEBANG_FILES= ${WRKSRC}/dotdotpwn.pl ${WRKSRC}/DotDotPwn/BisectionAlgorithm.pm ${WRKSRC}/DotDotPwn/FTP.pm ${WRKSRC}/DotDotPwn/File.pm ${WRKSRC}/DotDotPwn/Fingerprint.pm ${WRKSRC}/DotDotPwn/HTTP.pm ${WRKSRC}/DotDotPwn/HTTP_Url.pm ${WRKSRC}/DotDotPwn/Payload.pm ${WRKSRC}/DotDotPwn/STDOUT.pm ${WRKSRC}/DotDotPwn/TFTP.pm ${WRKSRC}/DotDotPwn/TraversalEngine.pm >X >XNO_BUILD= yes >XNO_ARCH= yes >X >XPORTDOCS= README.txt TODO.txt CHANGELOG.txt LICENSE.txt AUTHORS.txt EXAMPLES.txt >X >Xdo-install: >X ${INSTALL_SCRIPT} ${WRKSRC}/dotdotpwn.pl ${STAGEDIR}${PREFIX}/bin/dotdotpwn >X ${MKDIR} ${STAGEDIR}${PREFIX}/${SITE_PERL_REL}/DotDotPwn >X ${MKDIR} ${STAGEDIR}${DATADIR}/DotDotPwn >X (cd ${WRKSRC}/DotDotPwn && ${COPYTREE_SHARE} \* ${STAGEDIR}${PREFIX}/${SITE_PERL_REL}/DotDotPwn) >X ${MKDIR} ${STAGEDIR}${DOCSDIR} >X ${INSTALL_DATA} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR} >X ${INSTALL_DATA} ${WRKSRC}/DotDotPwn/User-Agents.txt ${STAGEDIR}${DATADIR} >X ${INSTALL_DATA} ${WRKSRC}/payload_sample_1.txt ${STAGEDIR}${DATADIR} >X ${INSTALL_DATA} ${WRKSRC}/payload_sample_2.txt ${STAGEDIR}${DATADIR} >X >X.include <bsd.port.mk> >9c3b112b65fe0ab9cb95256ca86091e0 >echo x - dotdotpwn/distinfo >sed 's/^X//' >dotdotpwn/distinfo << '58de86d1579c98a1ff079d13437c544d' >XSHA256 (wireghoul-dotdotpwn-3.0-bc7801f_GH0.tar.gz) = 7d66cf614f7b9a40fe836e5e55f1c7edd5bd98d9f1eabf4c38e81f765dd49301 >XSIZE (wireghoul-dotdotpwn-3.0-bc7801f_GH0.tar.gz) = 50067 >58de86d1579c98a1ff079d13437c544d >echo x - dotdotpwn/pkg-descr >sed 's/^X//' >dotdotpwn/pkg-descr << 'fa5b409fc00efb18cd2ccfe1e7f48f47' >XDotDotPwn - The Directory Traversal Fuzzer >X >XIt's a very flexible intelligent >Xfuzzer to discover traversal directory >Xvulnerabilities in software such as HTTP/FTP/TFTP >Xservers, Web platforms such as CMSs, >XERPs, Blogs, etc. >X >XAlso, it has a protocol-independent >Xmodule to send the desired payload to >Xthe host and port specified. On the >Xother hand, it also could be used in >Xa scripting way using the STDOUT module. >X >XIt's written in perl programming >Xlanguage and can be run either under >X*NIX or Windows platforms. >X >XWWW:https://github.com/wireghoul/dotdotpwn >fa5b409fc00efb18cd2ccfe1e7f48f47 >echo x - dotdotpwn/pkg-plist >sed 's/^X//' >dotdotpwn/pkg-plist << 'fbb6743d7bd984c7161b2b714cde1b40' >Xbin/dotdotpwn >X%%SITE_PERL%%/DotDotPwn/BisectionAlgorithm.pm >X%%SITE_PERL%%/DotDotPwn/FTP.pm >X%%SITE_PERL%%/DotDotPwn/File.pm >X%%SITE_PERL%%/DotDotPwn/Fingerprint.pm >X%%SITE_PERL%%/DotDotPwn/HTTP.pm >X%%SITE_PERL%%/DotDotPwn/HTTP_Url.pm >X%%SITE_PERL%%/DotDotPwn/Payload.pm >X%%SITE_PERL%%/DotDotPwn/STDOUT.pm >X%%SITE_PERL%%/DotDotPwn/TFTP.pm >X%%SITE_PERL%%/DotDotPwn/TraversalEngine.pm >X%%DATADIR%%/User-Agents.txt >X%%DATADIR%%/payload_sample_1.txt >X%%DATADIR%%/payload_sample_2.txt >fbb6743d7bd984c7161b2b714cde1b40 >echo c - dotdotpwn/files >mkdir -p dotdotpwn/files > /dev/null 2>&1 >echo x - dotdotpwn/files/patch-DotDotPwn_HTTP.pm >sed 's/^X//' >dotdotpwn/files/patch-DotDotPwn_HTTP.pm << '90bc3d218b0371941dc88de9fc9fee8d' >X--- DotDotPwn/HTTP.pm.orig 2016-05-05 08:37:25 UTC >X+++ DotDotPwn/HTTP.pm >X@@ -21,7 +21,7 @@ sub FuzzHTTP{ >X my $foo = 0; # Used as an auxiliary variable in quiet mode (see below) >X my $UserAgent; >X >X- open(AGENTS, "DotDotPwn/User-Agents.txt") or die "[-] Cannot open User-Agents.txt file: $!"; >X+ open(AGENTS, "/usr/local/share/dotdotpwn/User-Agents.txt") or die "[-] Cannot open User-Agents.txt file: $!"; >X my @UserAgents = <AGENTS>; >X close(AGENTS); >X >90bc3d218b0371941dc88de9fc9fee8d >echo x - dotdotpwn/files/patch-DotDotPwn_HTTP__Url.pm >sed 's/^X//' >dotdotpwn/files/patch-DotDotPwn_HTTP__Url.pm << 'e71d84437395d2d86de310e4b4cae25a' >X--- DotDotPwn/HTTP_Url.pm.orig 2016-05-05 08:38:21 UTC >X+++ DotDotPwn/HTTP_Url.pm >X@@ -29,7 +29,7 @@ sub FuzzHTTP_Url{ >X my $foo = 0; # Used as an auxiliary variable in quiet mode (see below) >X my $UserAgent; >X >X- open(AGENTS, "DotDotPwn/User-Agents.txt") or die "[-] Cannot open User-Agents.txt file: $!"; >X+ open(AGENTS, "/usr/local/share/dotdotpwn/User-Agents.txt") or die "[-] Cannot open User-Agents.txt file: $!"; >X my @UserAgents = <AGENTS>; >X close(AGENTS); >X >e71d84437395d2d86de310e4b4cae25a >exit >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 209323
: 170039