ports/55596: New port: vmap, security scanner
Francisco Gomez
francisco at gomezmarin.com
Thu Aug 14 23:30:24 UTC 2003
>Number: 55596
>Category: ports
>Synopsis: New port: vmap, security scanner
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: change-request
>Submitter-Id: current-users
>Arrival-Date: Thu Aug 14 16:30:17 PDT 2003
>Closed-Date:
>Last-Modified:
>Originator: Francisco Gomez
>Release: FreeBSD 5.1-RELEASE i386
>Organization:
>Environment:
System: FreeBSD roadwarrior.funfatal.org 5.1-RELEASE FreeBSD 5.1-RELEASE #1: Tue Aug 12 13:46:02 CEST 2003 root at francisco.gomezmarin.com:/usr/src/sys/i386/compile/ROADWARRIOR i386
>Description:
Vmap stands for version mapper. It allows you to find out the version
of a daemon by fingerprinting the features and replys of bogus
commands. It's a great addition to the other *map tools.
WWW: http://www.thc.org/releases.php
- Francisco Gomez -
francisco at gomezmarin.com
>How-To-Repeat:
>Fix:
--- output begins here ---
# This is a shell archive. Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file". Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
# /usr/ports/security/vmap/
# /usr/ports/security/vmap/Makefile
# /usr/ports/security/vmap/pkg-plist
# /usr/ports/security/vmap/distinfo
# /usr/ports/security/vmap/pkg-descr
#
echo c - /usr/ports/security/vmap/
mkdir -p /usr/ports/security/vmap/ > /dev/null 2>&1
echo x - /usr/ports/security/vmap/Makefile
sed 's/^X//' >/usr/ports/security/vmap/Makefile << 'END-of-/usr/ports/security/vmap/Makefile'
X# New ports collection makefile for: vmap
X# Date created: 11 August 2003
X# Whom: Francisco Gomez <francisco at gomezmarin.com>
X#
X# $FreeBSD$
X#
X
XPORTNAME= vmap
XPORTVERSION= 0.6
XCATEGORIES= security net
XMASTER_SITES= http://www.thc.org/releases/
X
XMAINTAINER= francisco at gomezmarin.com
XCOMMENT= Vmap allows you to find out the version of a "bogus" daemon
X
Xdo-install:
X @${INSTALL_PROGRAM} ${WRKSRC}/vmap ${LOCALBASE}/bin
X.include <bsd.port.mk>
END-of-/usr/ports/security/vmap/Makefile
echo x - /usr/ports/security/vmap/pkg-plist
sed 's/^X//' >/usr/ports/security/vmap/pkg-plist << 'END-of-/usr/ports/security/vmap/pkg-plist'
Xbin/vmap
END-of-/usr/ports/security/vmap/pkg-plist
echo x - /usr/ports/security/vmap/distinfo
sed 's/^X//' >/usr/ports/security/vmap/distinfo << 'END-of-/usr/ports/security/vmap/distinfo'
XMD5 (vmap-0.6.tar.gz) = 0bacf8350c52a2fdc37cb80beaece6c2
END-of-/usr/ports/security/vmap/distinfo
echo x - /usr/ports/security/vmap/pkg-descr
sed 's/^X//' >/usr/ports/security/vmap/pkg-descr << 'END-of-/usr/ports/security/vmap/pkg-descr'
XVmap stands for version mapper. It allows you to find out the version
Xof a daemon by fingerprinting the features and replys of bogus
Xcommands. It's a great addition to the other *map tools.
X
XWWW: http://www.thc.org/releases.php
X
X- Francisco Gomez -
Xfrancisco at gomezmarin.com
END-of-/usr/ports/security/vmap/pkg-descr
exit
--- output ends here ---
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list