svn commit: r445638 - head/net-mgmt/dnsmap
Dmitry Marakasov
amdmi3 at FreeBSD.org
Thu Jul 13 09:00:23 UTC 2017
Author: amdmi3
Date: Thu Jul 13 09:00:21 2017
New Revision: 445638
URL: https://svnweb.freebsd.org/changeset/ports/445638
Log:
- Fix LICENSE
- Add LICENSE_FILE
- Update WWW
- Cleanup trailing whitespace in pkg-descr
Approved by: portmgr blanket
Modified:
head/net-mgmt/dnsmap/Makefile
head/net-mgmt/dnsmap/pkg-descr
Modified: head/net-mgmt/dnsmap/Makefile
==============================================================================
--- head/net-mgmt/dnsmap/Makefile Thu Jul 13 08:20:35 2017 (r445637)
+++ head/net-mgmt/dnsmap/Makefile Thu Jul 13 09:00:21 2017 (r445638)
@@ -9,7 +9,8 @@ CATEGORIES= net-mgmt
MAINTAINER= rihaz.jerrin at gmail.com
COMMENT= DNS domain name brute forcing tool
-LICENSE= GPLv2
+LICENSE= GPLv2+
+LICENSE_FILE= ${WRKSRC}/gpl-2.0.txt
USE_GITHUB= yes
GH_ACCOUNT= lifanov
Modified: head/net-mgmt/dnsmap/pkg-descr
==============================================================================
--- head/net-mgmt/dnsmap/pkg-descr Thu Jul 13 08:20:35 2017 (r445637)
+++ head/net-mgmt/dnsmap/pkg-descr Thu Jul 13 09:00:21 2017 (r445638)
@@ -1,18 +1,18 @@
-dnsmap was originally released back in 2006 and
-was inspired by the fictional story "The Thief
-No One Saw" by Paul Craig, which can be found
+dnsmap was originally released back in 2006 and
+was inspired by the fictional story "The Thief
+No One Saw" by Paul Craig, which can be found
in the book "Stealing the Network - How to 0wn the Box".
-dnsmap is mainly meant to be used by pentesters
-during the information gathering/enumeration phase
-of infrastructure security assessments. During the
-enumeration stage, the security consultant would
+dnsmap is mainly meant to be used by pentesters
+during the information gathering/enumeration phase
+of infrastructure security assessments. During the
+enumeration stage, the security consultant would
typically discover the target company's IP netblocks,
domain names, phone numbers, etc ...
-Subdomain brute-forcing is another technique that
-should be used in the enumeration stage, as it's
-especially useful when other domain enumeration
+Subdomain brute-forcing is another technique that
+should be used in the enumeration stage, as it's
+especially useful when other domain enumeration
techniques such as zone transfers don't work.
-WWW: http://tools.kali.org/information-gathering/dnsmap
+WWW: https://tools.kali.org/information-gathering/dnsmap
More information about the svn-ports-all
mailing list