svn commit: r430732 - in head/net-mgmt: . dnsmap dnsmap/files
Nikolai Lifanov
lifanov at FreeBSD.org
Fri Jan 6 19:56:13 UTC 2017
Author: lifanov
Date: Fri Jan 6 19:56:11 2017
New Revision: 430732
URL: https://svnweb.freebsd.org/changeset/ports/430732
Log:
add net-mgmt/dnsmap : DNS domain name brute forcing tool
PR: 208732
Submitted by: Rihaz Jerrin <rihaz.jerrin at gmail.com>
Reviewed by: matthew
Approved by: matthew (mentor)
Differential Revision: https://reviews.freebsd.org/D9064
Added:
head/net-mgmt/dnsmap/
head/net-mgmt/dnsmap/Makefile (contents, props changed)
head/net-mgmt/dnsmap/distinfo (contents, props changed)
head/net-mgmt/dnsmap/files/
head/net-mgmt/dnsmap/files/patch-dnsmap-bulk.sh (contents, props changed)
head/net-mgmt/dnsmap/pkg-descr (contents, props changed)
Modified:
head/net-mgmt/Makefile
Modified: head/net-mgmt/Makefile
==============================================================================
--- head/net-mgmt/Makefile Fri Jan 6 18:56:13 2017 (r430731)
+++ head/net-mgmt/Makefile Fri Jan 6 19:56:11 2017 (r430732)
@@ -55,6 +55,7 @@
SUBDIR += dhcdrop
SUBDIR += dhcp_probe
SUBDIR += disco
+ SUBDIR += dnsmap
SUBDIR += docsis
SUBDIR += driftnet
SUBDIR += ehnt
Added: head/net-mgmt/dnsmap/Makefile
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/net-mgmt/dnsmap/Makefile Fri Jan 6 19:56:11 2017 (r430732)
@@ -0,0 +1,32 @@
+# Created by: Rihaz Jerrin <rihaz.jerrin at gmail.com>
+# $FreeBSD$
+
+PORTNAME= dnsmap
+PORTVERSION= 0.30
+DISTVERSIONPREFIX= v
+CATEGORIES= net-mgmt
+
+MAINTAINER= rihaz.jerrin at gmail.com
+COMMENT= DNS domain name brute forcing tool
+
+LICENSE= GPLv2
+
+USE_GITHUB= yes
+GH_ACCOUNT= lifanov
+
+PORTDOCS= Changelog.txt README.txt CREDITS.txt use_cases.txt
+
+PLIST_FILES= bin/dnsmap bin/dnsmap-bulk ${DATADIR}/wordlist_TLAs.txt
+
+do-build:
+ ${CC} ${CFLAGS} ${WRKSRC}/dnsmap.c -o ${WRKSRC}/dnsmap
+
+do-install:
+ ${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin/${PORTNAME}
+ ${INSTALL_SCRIPT} ${WRKSRC}/${PORTNAME}-bulk.sh ${STAGEDIR}${PREFIX}/bin/${PORTNAME}-bulk
+ ${MKDIR} ${STAGEDIR}${DATADIR}
+ ${INSTALL_DATA} ${WRKSRC}/wordlist_TLAs.txt ${STAGEDIR}${DATADIR}
+ ${MKDIR} ${STAGEDIR}${DOCSDIR}
+ ${INSTALL_DATA} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR}
+
+.include <bsd.port.mk>
Added: head/net-mgmt/dnsmap/distinfo
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/net-mgmt/dnsmap/distinfo Fri Jan 6 19:56:11 2017 (r430732)
@@ -0,0 +1,3 @@
+TIMESTAMP = 1483716371
+SHA256 (lifanov-dnsmap-v0.30_GH0.tar.gz) = 3b6b34566b89eb464e643d6af1d0c005c9bbc1bcc3ee50aaf2baf101615a5e93
+SIZE (lifanov-dnsmap-v0.30_GH0.tar.gz) = 72946
Added: head/net-mgmt/dnsmap/files/patch-dnsmap-bulk.sh
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/net-mgmt/dnsmap/files/patch-dnsmap-bulk.sh Fri Jan 6 19:56:11 2017 (r430732)
@@ -0,0 +1,23 @@
+--- dnsmap-bulk.sh.orig 2016-04-11 23:06:01 UTC
++++ dnsmap-bulk.sh
+@@ -1,5 +1,5 @@
+-#!/bin/bash
+-if [[ $# -ne 1 && $# -ne 2 ]]
++#!/bin/sh
++if [ $# -ne 1 -a $# -ne 2 ]
+ then
+ echo "usage: `basename $0` <domains-file> [results-path]";
+ echo "e.g.:";
+@@ -9,10 +9,10 @@ then
+ fi
+ for i in `cat $1`
+ do
+- if [[ $# -eq 1 ]]
++ if [ $# -eq 1 ]
+ then
+ dnsmap $i
+- elif [[ $# -eq 2 ]]
++ elif [ $# -eq 2 ]
+ then
+ dnsmap $i -r $2
+ fi
Added: head/net-mgmt/dnsmap/pkg-descr
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/net-mgmt/dnsmap/pkg-descr Fri Jan 6 19:56:11 2017 (r430732)
@@ -0,0 +1,18 @@
+dnsmap was originally released back in 2006 and
+was inspired by the fictional story "The Thief
+No One Saw" by Paul Craig, which can be found
+in the book "Stealing the Network - How to 0wn the Box".
+
+dnsmap is mainly meant to be used by pentesters
+during the information gathering/enumeration phase
+of infrastructure security assessments. During the
+enumeration stage, the security consultant would
+typically discover the target company's IP netblocks,
+domain names, phone numbers, etc ...
+
+Subdomain brute-forcing is another technique that
+should be used in the enumeration stage, as it's
+especially useful when other domain enumeration
+techniques such as zone transfers don't work.
+
+WWW: http://tools.kali.org/information-gathering/dnsmap
More information about the svn-ports-all
mailing list