Date: Fri, 22 Dec 2000 17:06:30 +0800 (CST) From: Ying-Chieh Liao <ijliao@terry.dragon2.net> To: FreeBSD-gnats-submit@freebsd.org Subject: ports/23749: update ports : security/dsniff Message-ID: <200012220906.eBM96Uk12657@Terry.Dorm8.NCTU.edu.tw> Resent-Message-ID: <200012220910.eBM9A3k33224@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 23749 >Category: ports >Synopsis: update ports : security/dsniff >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Fri Dec 22 01:10:02 PST 2000 >Closed-Date: >Last-Modified: >Originator: Ying-Chieh Liao >Release: FreeBSD 5.0-CURRENT i386 >Organization: NCTU CSIE >Environment: System: FreeBSD Terry.Dorm8.NCTU.edu.tw 5.0-CURRENT FreeBSD 5.0-CURRENT #0: Wed Dec 20 08:59:11 CST 2000 root@Terry.Dorm8.NCTU.edu.tw:/usr/obj/usr/src/sys/TERRY i386 >Description: update dsniff from 2.2 to 2.3 >How-To-Repeat: >Fix: diff -ruN /usr/ports/security/dsniff/Makefile dsniff/Makefile --- /usr/ports/security/dsniff/Makefile Mon Sep 11 02:36:32 2000 +++ dsniff/Makefile Fri Dec 22 16:47:35 2000 @@ -6,7 +6,7 @@ # PORTNAME= dsniff -PORTVERSION= 2.2 +PORTVERSION= 2.3 CATEGORIES= security MASTER_SITES= http://naughty.monkey.org/~dugsong/dsniff/ @@ -18,7 +18,8 @@ GNU_CONFIGURE= yes USE_XLIB= yes -MAN8= arpredirect.8 dsniff.8 macof.8 mailsnarf.8 tcpkill.8 \ - tcpnice.8 urlsnarf.8 webspy.8 filesnarf.8 +MAN8= arpspoof.8 dsniff.8 macof.8 mailsnarf.8 tcpkill.8 \ + tcpnice.8 urlsnarf.8 webspy.8 filesnarf.8 dnsspoof.8 msgsnarf.8 \ + sshmitm.8 webmitm.8 .include <bsd.port.mk> diff -ruN /usr/ports/security/dsniff/distinfo dsniff/distinfo --- /usr/ports/security/dsniff/distinfo Sat Sep 2 09:33:18 2000 +++ dsniff/distinfo Fri Dec 22 14:25:58 2000 @@ -1 +1 @@ -MD5 (dsniff-2.2.tar.gz) = 6b4529263d390149961cf3ca74d82141 +MD5 (dsniff-2.3.tar.gz) = 183e336a45e38013f3af840bddec44b4 diff -ruN /usr/ports/security/dsniff/files/patch-aa dsniff/files/patch-aa --- /usr/ports/security/dsniff/files/patch-aa Thu Jan 1 08:00:00 1970 +++ dsniff/files/patch-aa Fri Dec 22 16:31:18 2000 @@ -0,0 +1,11 @@ +--- Makefile.in.orig Fri Dec 22 16:30:32 2000 ++++ Makefile.in Fri Dec 22 16:30:50 2000 +@@ -37,7 +37,7 @@ + X11INC = @X_CFLAGS@ + X11LIB = @X_LIBS@ @X_PRE_LIBS@ -lXmu -lX11 @X_EXTRA_LIBS@ + +-INCS = -I. $(NIDSINC) $(PCAPINC) $(LNETINC) $(DBINC) $(SSLINC) $(X11INC) \ ++INCS = -I. -I/usr/include $(NIDSINC) $(PCAPINC) $(LNETINC) $(DBINC) $(SSLINC) $(X11INC) \ + -I$(srcdir)/missing + LIBS = @LIBS@ -L$(srcdir) -lmissing + diff -ruN /usr/ports/security/dsniff/pkg-descr dsniff/pkg-descr --- /usr/ports/security/dsniff/pkg-descr Sun Jan 9 11:13:59 2000 +++ dsniff/pkg-descr Fri Dec 22 16:59:10 2000 @@ -1,17 +1,26 @@ Various tools for network penetration testing. Please do not abuse them. -arpredirect redirect packets from a target host (or all hosts) on the LAN - intended for another host on the LAN by forging ARP replies -findgw determine the local gateway of an unknown network via passive - sniffing -macof flood the local network with random MAC addresses -dsniff simple password sniffer +arpspoof redirect packets from a target host (or all hosts) on the LAN + intended for another host on the LAN by forging ARP replies. +dnsspoof forge replies to arbitrary DNS address / pointer queries on + the LAN. +dsniff simple password sniffer. +filesnarf saves selected files sniffed from NFS traffic in the current + working directory. +macof flood the local network with random MAC addresses. mailsnarf a fast and easy way to violate the Electronic Communications - Privacy Act of 1986 (18 USC 2701-2711), be careful + Privacy Act of 1986 (18 USC 2701-2711), be careful. +msgsnarf record selected messages from sniffed AOL Instant Messenger, + ICQ 2000, IRC, and Yahoo! Messenger chat sessions. +sshmitm SSH monkey-in-the-middle. +tcpkill kills specified in-progress TCP connections. +tcpnice slow down specified TCP connections via "active" traffic + shaping. urlsnarf output all requested URLs sniffed from HTTP traffic in CLF (Common Log Format, used by almost all web servers), suitable for offline post-processing +webmitm HTTP / HTTPS monkey-in-the-middle. webspy sends URLs sniffed from a client to your local Netscape browser for display, a fun party trick -WWW: http://www.monkey.org/~dugsong/ +WWW: http://www.monkey.org/~dugsong/dsniff/ diff -ruN /usr/ports/security/dsniff/pkg-plist dsniff/pkg-plist --- /usr/ports/security/dsniff/pkg-plist Sun Sep 10 18:59:14 2000 +++ dsniff/pkg-plist Fri Dec 22 16:50:38 2000 @@ -1,12 +1,16 @@ lib/dsniff.magic lib/dsniff.services -sbin/arpredirect +lib/dnsspoof.hosts +sbin/arpspoof +sbin/dnsspoof sbin/dsniff sbin/filesnarf sbin/macof sbin/mailsnarf +sbin/msgsnarf +sbin/sshmitm sbin/tcpkill sbin/tcpnice sbin/urlsnarf +sbin/webmitm sbin/webspy - >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200012220906.eBM96Uk12657>