1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-31 10:46:16 +00:00

add net-mgmt/dnsmap : DNS domain name brute forcing tool

PR:		208732
Submitted by:	Rihaz Jerrin <rihaz.jerrin@gmail.com>
Reviewed by:	matthew
Approved by:	matthew (mentor)
Differential Revision:	https://reviews.freebsd.org/D9064
This commit is contained in:
Nikolai Lifanov 2017-01-06 19:56:11 +00:00
parent f3307d416c
commit befb53d1fa
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=430732
5 changed files with 77 additions and 0 deletions

View File

@ -55,6 +55,7 @@
SUBDIR += dhcdrop
SUBDIR += dhcp_probe
SUBDIR += disco
SUBDIR += dnsmap
SUBDIR += docsis
SUBDIR += driftnet
SUBDIR += ehnt

32
net-mgmt/dnsmap/Makefile Normal file
View File

@ -0,0 +1,32 @@
# Created by: Rihaz Jerrin <rihaz.jerrin@gmail.com>
# $FreeBSD$
PORTNAME= dnsmap
PORTVERSION= 0.30
DISTVERSIONPREFIX= v
CATEGORIES= net-mgmt
MAINTAINER= rihaz.jerrin@gmail.com
COMMENT= DNS domain name brute forcing tool
LICENSE= GPLv2
USE_GITHUB= yes
GH_ACCOUNT= lifanov
PORTDOCS= Changelog.txt README.txt CREDITS.txt use_cases.txt
PLIST_FILES= bin/dnsmap bin/dnsmap-bulk ${DATADIR}/wordlist_TLAs.txt
do-build:
${CC} ${CFLAGS} ${WRKSRC}/dnsmap.c -o ${WRKSRC}/dnsmap
do-install:
${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin/${PORTNAME}
${INSTALL_SCRIPT} ${WRKSRC}/${PORTNAME}-bulk.sh ${STAGEDIR}${PREFIX}/bin/${PORTNAME}-bulk
${MKDIR} ${STAGEDIR}${DATADIR}
${INSTALL_DATA} ${WRKSRC}/wordlist_TLAs.txt ${STAGEDIR}${DATADIR}
${MKDIR} ${STAGEDIR}${DOCSDIR}
${INSTALL_DATA} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR}
.include <bsd.port.mk>

3
net-mgmt/dnsmap/distinfo Normal file
View File

@ -0,0 +1,3 @@
TIMESTAMP = 1483716371
SHA256 (lifanov-dnsmap-v0.30_GH0.tar.gz) = 3b6b34566b89eb464e643d6af1d0c005c9bbc1bcc3ee50aaf2baf101615a5e93
SIZE (lifanov-dnsmap-v0.30_GH0.tar.gz) = 72946

View File

@ -0,0 +1,23 @@
--- dnsmap-bulk.sh.orig 2016-04-11 23:06:01 UTC
+++ dnsmap-bulk.sh
@@ -1,5 +1,5 @@
-#!/bin/bash
-if [[ $# -ne 1 && $# -ne 2 ]]
+#!/bin/sh
+if [ $# -ne 1 -a $# -ne 2 ]
then
echo "usage: `basename $0` <domains-file> [results-path]";
echo "e.g.:";
@@ -9,10 +9,10 @@ then
fi
for i in `cat $1`
do
- if [[ $# -eq 1 ]]
+ if [ $# -eq 1 ]
then
dnsmap $i
- elif [[ $# -eq 2 ]]
+ elif [ $# -eq 2 ]
then
dnsmap $i -r $2
fi

18
net-mgmt/dnsmap/pkg-descr Normal file
View File

@ -0,0 +1,18 @@
dnsmap was originally released back in 2006 and
was inspired by the fictional story "The Thief
No One Saw" by Paul Craig, which can be found
in the book "Stealing the Network - How to 0wn the Box".
dnsmap is mainly meant to be used by pentesters
during the information gathering/enumeration phase
of infrastructure security assessments. During the
enumeration stage, the security consultant would
typically discover the target company's IP netblocks,
domain names, phone numbers, etc ...
Subdomain brute-forcing is another technique that
should be used in the enumeration stage, as it's
especially useful when other domain enumeration
techniques such as zone transfers don't work.
WWW: http://tools.kali.org/information-gathering/dnsmap