ports/144150: New port: security/burpsuite web application pentest tool

Niels Heinen niels at heinen.ws
Sat Feb 20 21:30:02 UTC 2010


>Number:         144150
>Category:       ports
>Synopsis:       New port: security/burpsuite web application pentest tool
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Sat Feb 20 21:30:02 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator:     Niels Heinen
>Release:        FreeBSD 8.0-RELEASE
>Organization:
>Environment:
FreeBSD devbsd.lan 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21 15:48:17 UTC 2009     root at almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386
>Description:
Please find attached a new port: security/burpsuite: Burp Suite allows you to combine manual and automated techniques to enumerate, analyze, scan, attack and exploit web applications. 

Note to reviewer: Java port && license restrictions



>How-To-Repeat:

>Fix:
(port is attached)

Patch attached with submission follows:

# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	burpsuite/
#	burpsuite/Makefile
#	burpsuite/distinfo
#	burpsuite/pkg-descr
#	burpsuite/files
#	burpsuite/files/burpsuite.sh
#
echo c - burpsuite/
mkdir -p burpsuite/ > /dev/null 2>&1
echo x - burpsuite/Makefile
sed 's/^X//' >burpsuite/Makefile << '585c7f63a95494288277825d3deddaf7'
X# New ports collection makefile for:    Burpsuite
X# Date created:		2010/02/22
X# Whom:			Niels Heinen
X#
X# $FreeBSD$
X#
X
XPORTNAME=	burpsuite
XPORTVERSION=	1.3
XCATEGORIES=	security java
XMASTER_SITES=	#
XDISTNAME=	${PORTNAME}_v${PORTVERSION}
X
XMAINTAINER=	ports at FreeBSD.org
XCOMMENT=	Burp Suite is an integrated platform for testing web applications
X
XUSE_ZIP=	YES
XUSE_JAVA=	YES
XJAVA_VERSION=	1.4+
X
XNO_BUILD=	yes
XNO_CDROM=	License acceptance is required before installation
XNO_PACKAGE=	License acceptance is required before installation
XDOWNLOAD_URL=	http://www.portswigger.net/suite/burpsuite_v1.3.zip
X
XWRKSRC=		${WRKDIR}/${DISTNAME}
XPLIST_FILES=    %%JAVAJARDIR%%/${DISTNAME}.jar
X
X.if !defined(NOPORTDOCS)
XPORTDOCS=	"readme - running burp.txt" "terms and conditions.txt"
X.endif
X
X.include <bsd.port.pre.mk>
X.if !exists(${DISTDIR}/${DISTNAME}${EXTRACT_SUFX}) && !defined(PACKAGE_BUILDING)
XIGNORE=		you must manually fetch the distribution from ${DOWNLOAD_URL} and place it in ${DISTDIR} then run make again
X.endif
X
Xpre-install:
X	${SED} -e 's:%%PATH%%:${JAVAJARDIR}/:' \
X	-e 's:%%JAVA_CMD%%:${JAVA}:' \
X	-e 's:%%BURP%%:${JAVAJARDIR}/${DISTNAME}.jar:' \
X	< ${FILESDIR}/burpsuite.sh > ${WRKDIR}/burpsuite.sh
X
Xdo-install:
X	@${INSTALL_DATA} ${WRKSRC}/${DISTNAME}.jar ${JAVAJARDIR}/
X	${INSTALL_SCRIPT} ${WRKDIR}/burpsuite.sh ${PREFIX}/bin
X.if !defined(NOPORTDOCS)
X	${MKDIR} ${DOCSDIR}
X	${INSTALL_DATA} "${WRKSRC}/readme - running burp.txt" ${DOCSDIR};\
X	${INSTALL_DATA} "${WRKSRC}/terms and conditions.txt" ${DOCSDIR};
X.endif
X
X.include <bsd.port.post.mk>
585c7f63a95494288277825d3deddaf7
echo x - burpsuite/distinfo
sed 's/^X//' >burpsuite/distinfo << 'd6be2a6fff301fe7880a24f83fe9516d'
XMD5 (burpsuite_v1.3.zip) = 592004af60d77ee23fe4371a50eeb190
XSHA256 (burpsuite_v1.3.zip) = ccd421ee6d138346c3e5b117e98b3d89faa1a11fef5c54725bec99cb13765d2f
XSIZE (burpsuite_v1.3.zip) = 2530299
d6be2a6fff301fe7880a24f83fe9516d
echo x - burpsuite/pkg-descr
sed 's/^X//' >burpsuite/pkg-descr << 'c728211645abc5e6c97f2c28b59753a3'
XBurp Suite allows you to combine manual and automated techniques
Xto enumerate, analyse, scan, attack and exploit web applications.
XThe various Burp tools work together effectively to share information
Xand allow findings identified within one tool to form the basis of
Xan attack using another.
X
XWWW: http://www.portswigger.net/suite/ 
c728211645abc5e6c97f2c28b59753a3
echo c - burpsuite/files
mkdir -p burpsuite/files > /dev/null 2>&1
echo x - burpsuite/files/burpsuite.sh
sed 's/^X//' >burpsuite/files/burpsuite.sh << 'f9db53b5451851b6ddeae52fd6afb93d'
X#!/bin/sh
X#
X# $FreeBSD$
X#
X
Xcd %%PATH%%
Xexec %%JAVA_CMD%% -jar -Xmx256m %%BURP%% "$@"
f9db53b5451851b6ddeae52fd6afb93d
exit



>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list