FreeBSD Bugzilla – Attachment 95594 Details for
Bug 134021
[NEW PORT] security/py25-sslstrip: Python program for ssl stripping
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
py25-sslstrip-0.2.shar
py25-sslstrip-0.2.shar (text/plain), 4.02 KB, created by
Matthew Donovan
on 2009-04-26 19:10:01 UTC
(
hide
)
Description:
py25-sslstrip-0.2.shar
Filename:
MIME Type:
Creator:
Matthew Donovan
Created:
2009-04-26 19:10:01 UTC
Size:
4.02 KB
patch
obsolete
># This is a shell archive. Save it in a file, remove anything before ># this line, and then unpack it by entering "sh file". Note, it may ># create directories; files and directories will be owned by you and ># have default permissions. ># ># This archive contains: ># ># sslstrip ># sslstrip/Makefile ># sslstrip/distinfo ># sslstrip/pkg-descr ># sslstrip/pkg-plist ># sslstrip/files ># sslstrip/files/patch-setup.py ># >echo c - sslstrip >mkdir -p sslstrip > /dev/null 2>&1 >echo x - sslstrip/Makefile >sed 's/^X//' >sslstrip/Makefile << 'f9149b09d4ea5851260faaa84cff5251' >X# New ports collection makefile for: sslstrip >X# Date created: 2009-04-17 >X# Whom: User & <dragon@njord.localdomain> >X# >X# $FreeBSD$ >X# >X >XPORTNAME= sslstrip >XPORTVERSION= 0.2 >XCATEGORIES= security >XMASTER_SITES= http://www.thoughtcrime.org/software/sslstrip/ >XPKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} >XDISTNAME= ${PORTNAME}-${PORTVERSION} >X >XMAINTAINER= kitchetech@gmail.com >XCOMMENT= Python program for ssl stripping >X >XUSE_PYTHON= yes >XUSE_PYDISTUTILS= yes >XPYDISTUTILS_PKGNAME= sslstrip >X >X.include <bsd.port.mk> >f9149b09d4ea5851260faaa84cff5251 >echo x - sslstrip/distinfo >sed 's/^X//' >sslstrip/distinfo << 'd73df4de07798ffb52784fd27a9f5c89' >XMD5 (sslstrip-0.2.tar.gz) = 2dc5fc2d3c081c9065fca0cdd311576b >XSHA256 (sslstrip-0.2.tar.gz) = 18e319abfd26e12fbed8205947bcaa14e9adb886be2a4e1efb33577039875aac >XSIZE (sslstrip-0.2.tar.gz) = 22335 >d73df4de07798ffb52784fd27a9f5c89 >echo x - sslstrip/pkg-descr >sed 's/^X//' >sslstrip/pkg-descr << '0371f316f78a8992c7065a3882b1afa3' >XIt will transparently hijack HTTP traffic >Xon a network, watch for HTTPS links and redirects, then map those links >Xinto either look-alike HTTP links or homograph-similar HTTPS links. It >Xalso supports modes for supplying a favicon which looks like a lock icon, >Xselective logging, and session denial. >X >X >XWWW: http://www.thoughtcrime.org/software/sslstrip/ >0371f316f78a8992c7065a3882b1afa3 >echo x - sslstrip/pkg-plist >sed 's/^X//' >sslstrip/pkg-plist << '6c519efc9509738b654e52ead59c222a' >Xbin/sslstrip >X%%PYTHON_SITELIBDIR%%/sslstrip/CookieCleaner.py >X%%PYTHON_SITELIBDIR%%/sslstrip/CookieCleaner.pyc >X%%PYTHON_SITELIBDIR%%/sslstrip/CookieCleaner.pyo >X%%PYTHON_SITELIBDIR%%/sslstrip/DataShuffler.py >X%%PYTHON_SITELIBDIR%%/sslstrip/DataShuffler.pyc >X%%PYTHON_SITELIBDIR%%/sslstrip/DataShuffler.pyo >X%%PYTHON_SITELIBDIR%%/sslstrip/RetrySecureException.py >X%%PYTHON_SITELIBDIR%%/sslstrip/RetrySecureException.pyc >X%%PYTHON_SITELIBDIR%%/sslstrip/RetrySecureException.pyo >X%%PYTHON_SITELIBDIR%%/sslstrip/SSLDataShuffler.py >X%%PYTHON_SITELIBDIR%%/sslstrip/SSLDataShuffler.pyc >X%%PYTHON_SITELIBDIR%%/sslstrip/SSLDataShuffler.pyo >X%%PYTHON_SITELIBDIR%%/sslstrip/SSLShuffleSocket.py >X%%PYTHON_SITELIBDIR%%/sslstrip/SSLShuffleSocket.pyc >X%%PYTHON_SITELIBDIR%%/sslstrip/SSLShuffleSocket.pyo >X%%PYTHON_SITELIBDIR%%/sslstrip/SecureLinkListener.py >X%%PYTHON_SITELIBDIR%%/sslstrip/SecureLinkListener.pyc >X%%PYTHON_SITELIBDIR%%/sslstrip/SecureLinkListener.pyo >X%%PYTHON_SITELIBDIR%%/sslstrip/ShuffleSocket.py >X%%PYTHON_SITELIBDIR%%/sslstrip/ShuffleSocket.pyc >X%%PYTHON_SITELIBDIR%%/sslstrip/ShuffleSocket.pyo >X%%PYTHON_SITELIBDIR%%/sslstrip/__init__.py >X%%PYTHON_SITELIBDIR%%/sslstrip/__init__.pyc >X%%PYTHON_SITELIBDIR%%/sslstrip/__init__.pyo >X%%DATADIR%%/COPYING >X%%DATADIR%%/README >X%%DATADIR%%/lock.ico >X@dirrm %%DATADIR%% >X@dirrm %%PYTHON_SITELIBDIR%%/sslstrip >6c519efc9509738b654e52ead59c222a >echo c - sslstrip/files >mkdir -p sslstrip/files > /dev/null 2>&1 >echo x - sslstrip/files/patch-setup.py >sed 's/^X//' >sslstrip/files/patch-setup.py << '78825a01de4c600f80cd12edea8aad98' >X--- setup.py.orig 2009-04-24 10:19:32.000000000 -0400 >X+++ setup.py 2009-04-24 10:19:45.000000000 -0400 >X@@ -5,7 +5,7 @@ >X shutil.copyfile("sslstrip.py", "sslstrip/sslstrip") >X >X setup (name = 'sslstrip', >X- version = '0.1', >X+ version = '0.2', >X description = 'A MITM tool that implements Moxie Marlinspike\'s HTTPS stripping attacks.', >X author = 'Moxie Marlinspike', >X author_email = 'moxie@thoughtcrime.org', >78825a01de4c600f80cd12edea8aad98 >exit
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 134021
: 95594