Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Oct 2000 15:31:11 +0200 (IST)
From:      roman@xpert.com
To:        FreeBSD-gnats-submit@freebsd.org
Subject:   ports/21933: NEW port: security/hping
Message-ID:  <20001012133111.2C5887070@sun262.hai.iec.co.il>

next in thread | raw e-mail | index | archive | help

>Number:         21933
>Category:       ports
>Synopsis:       NEW PORT: security/hping
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Thu Oct 12 06:40:00 PDT 2000
>Closed-Date:
>Last-Modified:
>Originator:     Roman Shterenzon
>Release:        FreeBSD 4.1-RELEASE
>Organization:
>Environment:


>Description:

From pkg-descr:
hping2 is a network tool able to send custom ICMP/UDP/TCP
packets and to display target replies like ping do with
ICMP replies. hping2 handle fragmentation, arbitrary packet
body and size and can be used in order to transfer files
under supported protocols. Using hping2 you are able at
least to perform the following jobs:

        - Test firewall rules
        - [spoofed] port scanning
        - Test net performance using different protocols,
          packet size, TOS (type of service) and fragmentation.
        - Path MTU discovery
        - Files transfering even between really fascist firewall rules.
        - Traceroute like under different protocols.
        - Firewalk like usage.
        - Remote OS fingerprint.
        - TCP/IP stack auditing.
        - A lot of others. 

WWW: http://www.kyuzz.org/antirez/hping/

>How-To-Repeat:


>Fix:


# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	hping
#	hping/files
#	hping/files/patch-aa
#	hping/files/patch-ab
#	hping/files/patch-ac
#	hping/Makefile
#	hping/pkg-comment
#	hping/pkg-plist
#	hping/pkg-descr
#	hping/distinfo
#
echo c - hping
mkdir -p hping > /dev/null 2>&1
echo c - hping/files
mkdir -p hping/files > /dev/null 2>&1
echo x - hping/files/patch-aa
sed 's/^X//' >hping/files/patch-aa << 'END-of-hping/files/patch-aa'
X--- configure.orig	Thu Jul  6 20:06:10 2000
X+++ configure	Thu Oct  5 15:33:45 2000
X@@ -65,8 +65,8 @@
X 			;;
X 		*"--force-libpcap")
X 			FORCE_LIBPCAP="-DFORCE_LIBPCAP"
X-			PCAP="PCAP=libpcap/libpcap.a"
X-			PCAP_INCLUDE="-I./libpcap"
X+			PCAP="PCAP=-lpcap"
X+			PCAP_INCLUDE=""
X 			;;
X 		*"--dont-use-proc")
X 			HAVE_PROC=""
X@@ -92,7 +92,7 @@
X 			-e s/@FORCE_LIBPCAP@/"$FORCE_LIBPCAP"/g \
X 			-e s/@HAVE_PROC@/"$HAVE_PROC"/g \
X 			-e s^@PCAP@^"$PCAP"^g \
X-			-e s^@PCAP_INCLUDE@^"$PCAP_INCLUDE$"^g \
X+			-e s^@PCAP_INCLUDE@^"$PCAP_INCLUDE"^g \
X 			-e s^@MANPATH@^"$INSTALL_MANPATH"^g \
X 			> Makefile
X 
END-of-hping/files/patch-aa
echo x - hping/files/patch-ab
sed 's/^X//' >hping/files/patch-ab << 'END-of-hping/files/patch-ab'
X--- Makefile.in.orig	Thu Oct  5 15:22:25 2000
X+++ Makefile.in	Thu Oct  5 15:25:28 2000
X@@ -6,8 +6,8 @@
X # $date: Sun Jul 25 17:56:15 MET DST 1999$ 
X # $rev: 3$ 
X 
X-CC= gcc
X-CCOPT= -O2 -Wall @PCAP_INCLUDE@
X+CC?= gcc
X+CCOPT= $(CFLAGS) -Wall @PCAP_INCLUDE@
X DEBUG= -g
X #uncomment the following if you need libpcap based build under linux
X #(not raccomanded)
END-of-hping/files/patch-ab
echo x - hping/files/patch-ac
sed 's/^X//' >hping/files/patch-ac << 'END-of-hping/files/patch-ac'
X--- getlhs.c.orig	Thu Oct  5 15:26:31 2000
X+++ getlhs.c	Thu Oct  5 15:26:26 2000
X@@ -73,6 +73,7 @@
X 	else if ( strstr(ifname, "eth") /* ? */
X 	     ||   strstr(ifname, "ed")
X 	     ||   strstr(ifname, "ne")
X+	     ||   strstr(ifname, "xe")	/* Xircom */
X 	     ||   strstr(ifname, "xl")	/* 3com */
X 	     ||   strstr(ifname, "vx")	/* 3com (older model) */
X 	     ||   strstr(ifname, "ep")  /* 3com 3c589 */
END-of-hping/files/patch-ac
echo x - hping/Makefile
sed 's/^X//' >hping/Makefile << 'END-of-hping/Makefile'
X# New ports collection makefile for:	hping
X# Date Created:				5 Oct 2000
X# Whom:					Roman Shterenzon <roman@xpert.com>
X#
X# $FreeBSD$
X#
X
XPORTNAME=	hping
XPORTVERSION=	2b54
XCATEGORIES=     security net
XMASTER_SITES=	http://www.kyuzz.org/antirez/hping2-src/
XDISTNAME=	hping2-beta54
X
XMAINTAINER=	roman@xpert.com
X
XGNU_CONFIGURE=	yes
XCONFIGURE_ARGS+=	--force-libpcap
X
XMAN8=	hping.8
X
Xdo-install:
X	${INSTALL_PROGRAM} ${WRKSRC}/hping2 ${PREFIX}/sbin/hping
X	${INSTALL_MAN} ${WRKSRC}/docs/hping2.8 ${PREFIX}/man/man8/hping.8
X
X.include <bsd.port.mk>
END-of-hping/Makefile
echo x - hping/pkg-comment
sed 's/^X//' >hping/pkg-comment << 'END-of-hping/pkg-comment'
XNetwork auditing tool
END-of-hping/pkg-comment
echo x - hping/pkg-plist
sed 's/^X//' >hping/pkg-plist << 'END-of-hping/pkg-plist'
Xsbin/hping
END-of-hping/pkg-plist
echo x - hping/pkg-descr
sed 's/^X//' >hping/pkg-descr << 'END-of-hping/pkg-descr'
Xhping2 is a network tool able to send custom ICMP/UDP/TCP
Xpackets and to display target replies like ping do with
XICMP replies. hping2 handle fragmentation, arbitrary packet
Xbody and size and can be used in order to transfer files
Xunder supported protocols. Using hping2 you are able at
Xleast to perform the following jobs:
X
X	- Test firewall rules
X	- [spoofed] port scanning
X	- Test net performance using different protocols,
X	  packet size, TOS (type of service) and fragmentation.
X	- Path MTU discovery
X	- Files transfering even between really fascist firewall rules.
X	- Traceroute like under different protocols.
X	- Firewalk like usage.
X	- Remote OS fingerprint.
X	- TCP/IP stack auditing.
X	- A lot of others. 
X
XWWW: http://www.kyuzz.org/antirez/hping/
X
X-- Roman Shterenzon <roman@xpert.com>
END-of-hping/pkg-descr
echo x - hping/distinfo
sed 's/^X//' >hping/distinfo << 'END-of-hping/distinfo'
XMD5 (hping2-beta54.tar.gz) = 703f2102b948f214d59d89b41bca9923
END-of-hping/distinfo
exit


>Release-Note:
>Audit-Trail:
>Unformatted:


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001012133111.2C5887070>