From owner-freebsd-ports-bugs@FreeBSD.ORG Thu Aug 14 16:30:23 2003 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 09F5B37B401 for ; Thu, 14 Aug 2003 16:30:23 -0700 (PDT) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id D331B43FE9 for ; Thu, 14 Aug 2003 16:30:18 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.12.9/8.12.9) with ESMTP id h7ENUIUp074929 for ; Thu, 14 Aug 2003 16:30:18 -0700 (PDT) (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.12.9/8.12.9/Submit) id h7ENUIxx074928; Thu, 14 Aug 2003 16:30:18 -0700 (PDT) Resent-Date: Thu, 14 Aug 2003 16:30:18 -0700 (PDT) Resent-Message-Id: <200308142330.h7ENUIxx074928@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Francisco Gomez Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 73E6D37B401 for ; Thu, 14 Aug 2003 16:30:04 -0700 (PDT) Received: from v2project.com (cliente-212079143235.cm256.senpc.supercable.es [212.79.143.235]) by mx1.FreeBSD.org (Postfix) with SMTP id 4BD7243F75 for ; Thu, 14 Aug 2003 16:30:03 -0700 (PDT) (envelope-from king@v2project.com) Received: (qmail 17785 invoked by uid 1001); 14 Aug 2003 23:33:27 -0000 Message-Id: <20030814233327.17784.qmail@v2project.com> Date: 14 Aug 2003 23:33:27 -0000 From: Francisco Gomez To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Subject: ports/55596: New port: vmap, security scanner X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: Francisco Gomez List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 14 Aug 2003 23:30:24 -0000 >Number: 55596 >Category: ports >Synopsis: New port: vmap, security scanner >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Thu Aug 14 16:30:17 PDT 2003 >Closed-Date: >Last-Modified: >Originator: Francisco Gomez >Release: FreeBSD 5.1-RELEASE i386 >Organization: >Environment: System: FreeBSD roadwarrior.funfatal.org 5.1-RELEASE FreeBSD 5.1-RELEASE #1: Tue Aug 12 13:46:02 CEST 2003 root@francisco.gomezmarin.com:/usr/src/sys/i386/compile/ROADWARRIOR i386 >Description: Vmap stands for version mapper. It allows you to find out the version of a daemon by fingerprinting the features and replys of bogus commands. It's a great addition to the other *map tools. WWW: http://www.thc.org/releases.php - Francisco Gomez - francisco@gomezmarin.com >How-To-Repeat: >Fix: --- output begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # /usr/ports/security/vmap/ # /usr/ports/security/vmap/Makefile # /usr/ports/security/vmap/pkg-plist # /usr/ports/security/vmap/distinfo # /usr/ports/security/vmap/pkg-descr # echo c - /usr/ports/security/vmap/ mkdir -p /usr/ports/security/vmap/ > /dev/null 2>&1 echo x - /usr/ports/security/vmap/Makefile sed 's/^X//' >/usr/ports/security/vmap/Makefile << 'END-of-/usr/ports/security/vmap/Makefile' X# New ports collection makefile for: vmap X# Date created: 11 August 2003 X# Whom: Francisco Gomez X# X# $FreeBSD$ X# X XPORTNAME= vmap XPORTVERSION= 0.6 XCATEGORIES= security net XMASTER_SITES= http://www.thc.org/releases/ X XMAINTAINER= francisco@gomezmarin.com XCOMMENT= Vmap allows you to find out the version of a "bogus" daemon X Xdo-install: X @${INSTALL_PROGRAM} ${WRKSRC}/vmap ${LOCALBASE}/bin X.include END-of-/usr/ports/security/vmap/Makefile echo x - /usr/ports/security/vmap/pkg-plist sed 's/^X//' >/usr/ports/security/vmap/pkg-plist << 'END-of-/usr/ports/security/vmap/pkg-plist' Xbin/vmap END-of-/usr/ports/security/vmap/pkg-plist echo x - /usr/ports/security/vmap/distinfo sed 's/^X//' >/usr/ports/security/vmap/distinfo << 'END-of-/usr/ports/security/vmap/distinfo' XMD5 (vmap-0.6.tar.gz) = 0bacf8350c52a2fdc37cb80beaece6c2 END-of-/usr/ports/security/vmap/distinfo echo x - /usr/ports/security/vmap/pkg-descr sed 's/^X//' >/usr/ports/security/vmap/pkg-descr << 'END-of-/usr/ports/security/vmap/pkg-descr' XVmap stands for version mapper. It allows you to find out the version Xof a daemon by fingerprinting the features and replys of bogus Xcommands. It's a great addition to the other *map tools. X XWWW: http://www.thc.org/releases.php X X- Francisco Gomez - Xfrancisco@gomezmarin.com END-of-/usr/ports/security/vmap/pkg-descr exit --- output ends here --- >Release-Note: >Audit-Trail: >Unformatted: