ports/72898: New port: security/dnshijacker, a tool to fake DNS responses

David Thiel lx at redundancy.redundancy.org
Tue Oct 19 20:50:26 UTC 2004


>Number:         72898
>Category:       ports
>Synopsis:       New port: security/dnshijacker, a tool to fake DNS responses
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Tue Oct 19 20:50:25 GMT 2004
>Closed-Date:
>Last-Modified:
>Originator:     David Thiel
>Release:        FreeBSD 4.9-STABLE i386
>Organization:
>Environment:
System: FreeBSD redundancy.redundancy.org 4.9-STABLE FreeBSD 4.9-STABLE #15: Wed Nov 19 21:41:32 PST 2003 lx at redundancy.redundancy.org:/usr/obj/usr/src/sys/REDUNDANCY i386


>Description:

dnshijacker is a libnet/libpcap based packet sniffer & spoofer. a
versatile tool, dnshijacker supports tcpdump style filters that allow
you to specifically target victims. dns answers are forged based on
entries in a "fabrication table" or by simply forging one answer to all
requests. a print only mode is also supported, allowing one to simply
monitor dns traffic. dns hijacker is an excellent tool for network level
ad blocking / removal.


>How-To-Repeat:
>Fix:

# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	dnshijacker
#	dnshijacker/Makefile
#	dnshijacker/distinfo
#	dnshijacker/pkg-descr
#
echo c - dnshijacker
mkdir -p dnshijacker > /dev/null 2>&1
echo x - dnshijacker/Makefile
sed 's/^X//' >dnshijacker/Makefile << 'END-of-dnshijacker/Makefile'
X# New ports collection makefile for:	dnshijacker
X# Date created:		2004-10-19
X# Whom:			lx at redundancy.redundancy.org
X#
X# $FreeBSD$
X#
X
XPORTNAME=	dnshijacker
XPORTVERSION=	1.3
XCATEGORIES=	security
XMASTER_SITES=	http://pedram.redhive.com/downloads/
X
XMAINTAINER=	lx at redundancy.redundancy.org
XCOMMENT=	A tool to hijack DNS requests
X
XBUILD_DEPENDS=	${LOCALBASE}/lib/libnet.a:${PORTSDIR}/net/libnet
X
XLDFLAGS+=	-lpcap -lnet
X
XPLIST_FILES=	bin/dnshijacker
XPORTDOCS=	README
X
Xdo-build:
X	cd ${WRKSRC} && \
X	${CC} ${PORTNAME}.c ${CFLAGS} -I${LOCALBASE}/include \
X	-L${LOCALBASE}/lib ${LDFLAGS} `libnet-config --defines` \
X	`libnet-config --cflags` -o ${PORTNAME}
X
Xdo-install:
X	${INSTALL_PROGRAM} ${WRKSRC}/dnshijacker ${PREFIX}/bin
X
X.include <bsd.port.mk>
END-of-dnshijacker/Makefile
echo x - dnshijacker/distinfo
sed 's/^X//' >dnshijacker/distinfo << 'END-of-dnshijacker/distinfo'
XMD5 (dnshijacker-1.3.tar.gz) = 6b99d105fc78d84e963661ae7bf4c06d
XSIZE (dnshijacker-1.3.tar.gz) = 23561
END-of-dnshijacker/distinfo
echo x - dnshijacker/pkg-descr
sed 's/^X//' >dnshijacker/pkg-descr << 'END-of-dnshijacker/pkg-descr'
Xdnshijacker is a libnet/libpcap based packet sniffer & spoofer. a
Xversatile tool, dnshijacker supports tcpdump style filters that allow
Xyou to specifically target victims. dns answers are forged based on
Xentries in a "fabrication table" or by simply forging one answer to all
Xrequests. a print only mode is also supported, allowing one to simply
Xmonitor dns traffic. dns hijacker is an excellent tool for network level
Xad blocking / removal.
X
XWWW:	http://pedram.redhive.com/projects.php
END-of-dnshijacker/pkg-descr
exit


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list