Date: Wed, 2 Apr 2003 10:51:04 +0200 (CEST) From: "Michael L.Hostbaek" <mich@freebsdcluster.org> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/50536: New port: net/ttlscan Message-ID: <20030402085104.7784114C8C@icommerce-france.com> Resent-Message-ID: <200304020900.h3290NaA003181@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 50536 >Category: ports >Synopsis: New port: net/ttlscan >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Wed Apr 02 01:00:22 PST 2003 >Closed-Date: >Last-Modified: >Originator: Michael L. Hostbaek >Release: FreeBSD 4.7-STABLE i386 >Organization: FreeBSDCluster.org >Environment: System: FreeBSD extranet.itxmarket.com 4.7-STABLE FreeBSD 4.7-STABLE #0: Fri Oct 11 17:00:45 CEST 2002 root@extranet.itxmarket.com:/usr/obj/usr/src/sys/EXTRANET1 i386 >Description: New port. A tcp based scanner, showing ttl of responses. >How-To-Repeat: >Fix: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # ttlscan # ttlscan/Makefile # ttlscan/distinfo # ttlscan/pkg-plist # ttlscan/pkg-descr # echo c - ttlscan mkdir -p ttlscan > /dev/null 2>&1 echo x - ttlscan/Makefile sed 's/^X//' >ttlscan/Makefile << 'END-of-ttlscan/Makefile' X# ex:ts=8 X# Ports collection makefile for: ttlscan X# Date created: Wed Apr 2, 2003 X# Whom: Michael L. Hostbaek (mich@freebsdcluster.org) X# X# $FreeBSD$ X# X XPORTNAME= ttlscan XPORTVERSION= 0.1.1 XCATEGORIES= net XMASTER_SITES= http://www.raisdorf.net/files/code/ X XMAINTAINER= mich@freebsdcluster.org XCOMMENT= A tcp based scanner, showing ttl responses X XBUILD_DEPENDS= ${LOCALBASE}/include/dnet.h:${PORTSDIR}/net/libdnet X XLDFLAGS+= -lpcap -ldnet X Xdo-build: X (cd ${WRKSRC} && ${CC} ${CFLAGS} -I${LOCALBASE}/include -L${LOCALBASE}/lib -D_XOPEN_SOURCE \ X `libnet-config --defines` ${PORTNAME}.c -o ${PORTNAME} `libnet-config --libs` ${LDFLAGS}) X Xdo-install: X ${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${PREFIX}/bin X X.if !defined(NOPORTDOCS) X @${MKDIR} ${DOCSDIR} X ${INSTALL_DATA} ${WRKSRC}/README ${DOCSDIR} X.endif X X.include <bsd.port.mk> END-of-ttlscan/Makefile echo x - ttlscan/distinfo sed 's/^X//' >ttlscan/distinfo << 'END-of-ttlscan/distinfo' XMD5 (ttlscan-0.1.1.tar.gz) = 2951a7ca5a1efef74215f6a54c67abb5 END-of-ttlscan/distinfo echo x - ttlscan/pkg-plist sed 's/^X//' >ttlscan/pkg-plist << 'END-of-ttlscan/pkg-plist' Xbin/ttlscan X%%PORTDOCS%%share/doc/ttlscan/README X%%PORTDOCS%%@dirrm /share/doc/ttlscan END-of-ttlscan/pkg-plist echo x - ttlscan/pkg-descr sed 's/^X//' >ttlscan/pkg-descr << 'END-of-ttlscan/pkg-descr' Xttlscan is a libnet/libpcap based program that sends a TCP SYN packet to Xeach port of the host given via the command line. The answer is sniffed Xof the wire. I use it to detect hosts that fake services by forwarding Xpackets to another host (behind a firewall). By reading header files Xlike the TTL, window size and IPID you might be able to see the OS Xrunning on the host behind the firewall. X XWWW: http://www.raisdorf.net/projects/ttlscan XAUTHOR: Hendrik Scholz <hendrik@scholz.net> X X - Michael L. Hostbaek X mich@freebsdcluster.org END-of-ttlscan/pkg-descr exit >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030402085104.7784114C8C>