Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 06 May 2016 09:10:18 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 209323] [new port]:security/dotdotpwn : fuzzer to discover traversal directory vulnerabilities
Message-ID:  <bug-209323-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D209323

            Bug ID: 209323
           Summary: [new port]:security/dotdotpwn : fuzzer to discover
                    traversal directory vulnerabilities
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: rihaz.jerrin@gmail.com

Created attachment 170039
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D170039&action=
=3Dedit
[new port]:security/dotdotpwn port file

DotDotPwn - The Directory Traversal Fuzzer

It's a very flexible intelligent=20
fuzzer to discover traversal directory=20
vulnerabilities in software such as HTTP/FTP/TFTP=20
servers, Web platforms such as CMSs,=20
ERPs, Blogs, etc.=20

Also, it has a protocol-independent=20
module to send the desired payload to=20
the host and port specified. On the=20
other hand, it also could be used in=20
a scripting way using the STDOUT module.

It's written in perl programming=20
language and can be run either under=20
*NIX or Windows platforms.

WWW:https://github.com/wireghoul/dotdotpwn

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-209323-13>