ports/50536: New port: net/ttlscan

Michael L.Hostbaek mich at freebsdcluster.org
Wed Apr 2 09:00:24 UTC 2003


>Number:         50536
>Category:       ports
>Synopsis:       New port: net/ttlscan
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Wed Apr 02 01:00:22 PST 2003
>Closed-Date:
>Last-Modified:
>Originator:     Michael L. Hostbaek
>Release:        FreeBSD 4.7-STABLE i386
>Organization:
FreeBSDCluster.org
>Environment:
System: FreeBSD extranet.itxmarket.com 4.7-STABLE FreeBSD 4.7-STABLE #0: Fri Oct 11 17:00:45 CEST 2002 root at extranet.itxmarket.com:/usr/obj/usr/src/sys/EXTRANET1 i386
>Description:
	New port.
	A tcp based scanner, showing ttl of responses.
>How-To-Repeat:
>Fix:

	
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	ttlscan
#	ttlscan/Makefile
#	ttlscan/distinfo
#	ttlscan/pkg-plist
#	ttlscan/pkg-descr
#
echo c - ttlscan
mkdir -p ttlscan > /dev/null 2>&1
echo x - ttlscan/Makefile
sed 's/^X//' >ttlscan/Makefile << 'END-of-ttlscan/Makefile'
X# ex:ts=8
X# Ports collection makefile for:  ttlscan
X# Date created:                Wed Apr 2, 2003
X# Whom:                        Michael L. Hostbaek (mich at freebsdcluster.org)
X#
X# $FreeBSD$
X#
X
XPORTNAME=	ttlscan
XPORTVERSION=	0.1.1
XCATEGORIES=	net
XMASTER_SITES=	http://www.raisdorf.net/files/code/
X
XMAINTAINER=	mich at freebsdcluster.org
XCOMMENT=	A tcp based scanner, showing ttl responses
X
XBUILD_DEPENDS=	${LOCALBASE}/include/dnet.h:${PORTSDIR}/net/libdnet
X
XLDFLAGS+=	-lpcap -ldnet
X
Xdo-build:
X	(cd ${WRKSRC} && ${CC} ${CFLAGS} -I${LOCALBASE}/include -L${LOCALBASE}/lib -D_XOPEN_SOURCE \
X	`libnet-config --defines` ${PORTNAME}.c -o ${PORTNAME} `libnet-config --libs` ${LDFLAGS})
X
Xdo-install:
X	${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${PREFIX}/bin
X
X.if !defined(NOPORTDOCS)
X	@${MKDIR} ${DOCSDIR}
X	${INSTALL_DATA} ${WRKSRC}/README ${DOCSDIR}
X.endif
X
X.include <bsd.port.mk>
END-of-ttlscan/Makefile
echo x - ttlscan/distinfo
sed 's/^X//' >ttlscan/distinfo << 'END-of-ttlscan/distinfo'
XMD5 (ttlscan-0.1.1.tar.gz) = 2951a7ca5a1efef74215f6a54c67abb5
END-of-ttlscan/distinfo
echo x - ttlscan/pkg-plist
sed 's/^X//' >ttlscan/pkg-plist << 'END-of-ttlscan/pkg-plist'
Xbin/ttlscan
X%%PORTDOCS%%share/doc/ttlscan/README
X%%PORTDOCS%%@dirrm /share/doc/ttlscan
END-of-ttlscan/pkg-plist
echo x - ttlscan/pkg-descr
sed 's/^X//' >ttlscan/pkg-descr << 'END-of-ttlscan/pkg-descr'
Xttlscan is a libnet/libpcap based program that sends a TCP SYN packet to 
Xeach port of the host given via the command line. The answer is sniffed 
Xof the wire. I use it to detect hosts that fake services by forwarding 
Xpackets to another host (behind a firewall). By reading header files 
Xlike the TTL, window size and IPID you might be able to see the OS 
Xrunning on the host behind the firewall.
X
XWWW:	http://www.raisdorf.net/projects/ttlscan
XAUTHOR:	Hendrik Scholz <hendrik at scholz.net>
X
X	- Michael L. Hostbaek
X	mich at freebsdcluster.org
END-of-ttlscan/pkg-descr
exit


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list