Date: Sun, 26 May 2019 22:00:24 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 231920] [NEW PORT] : security/ismtp: Test for SMTP user enumeration (RCPT TO and VRFY), internal spoofing, and relay Message-ID: <bug-231920-7788-5DzLId3tes@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-231920-7788@https.bugs.freebsd.org/bugzilla/> References: <bug-231920-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D231920 --- Comment #8 from commit-hook@freebsd.org --- A commit references this bug: Author: swills Date: Sun May 26 21:59:59 UTC 2019 New revision: 502752 URL: https://svnweb.freebsd.org/changeset/ports/502752 Log: security/ismtp: create port SMTP user enumeration (RCPT TO and VRFY), internal spoofing, and open rel= ay. A tool that tested for all three and with great flexibility. iSMTP does just that, making it much easier to knock that process out of the way. WWW: https://github.com/altjx/ipwn/tree/master/iSMTP PR: 231920 Submitted by: Rihaz Jerrin <rihaz.jerrin@gmail.com> Changes: head/security/Makefile head/security/ismtp/ head/security/ismtp/Makefile head/security/ismtp/distinfo head/security/ismtp/files/ head/security/ismtp/files/patch-iSMTP.py head/security/ismtp/pkg-descr --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-231920-7788-5DzLId3tes>