The long-awaited upgrade to dsniff 2.3, which includes the now-infamous

sshmitm and webmitm monkey-in-the-middle tools.

Submitted by:	Ying-Chieh Liao <ijliao@terry.dragon2.net>
PR:		23749
This commit is contained in:
Kris Kennaway 2001-01-14 08:12:52 +00:00
parent 1804397a63
commit 152294c8ec
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=37179
4 changed files with 28 additions and 14 deletions

View File

@ -6,7 +6,7 @@
#
PORTNAME= dsniff
PORTVERSION= 2.2
PORTVERSION= 2.3
CATEGORIES= security
MASTER_SITES= http://naughty.monkey.org/~dugsong/dsniff/
@ -18,7 +18,8 @@ BUILD_DEPENDS= ${LOCALBASE}/lib/libnet.a:${PORTSDIR}/net/libnet \
GNU_CONFIGURE= yes
USE_XLIB= yes
MAN8= arpredirect.8 dsniff.8 macof.8 mailsnarf.8 tcpkill.8 \
tcpnice.8 urlsnarf.8 webspy.8 filesnarf.8
MAN8= arpspoof.8 dsniff.8 macof.8 mailsnarf.8 tcpkill.8 \
tcpnice.8 urlsnarf.8 webspy.8 filesnarf.8 dnsspoof.8 msgsnarf.8 \
sshmitm.8 webmitm.8
.include <bsd.port.mk>

View File

@ -1 +1 @@
MD5 (dsniff-2.2.tar.gz) = 6b4529263d390149961cf3ca74d82141
MD5 (dsniff-2.3.tar.gz) = 183e336a45e38013f3af840bddec44b4

View File

@ -1,17 +1,26 @@
Various tools for network penetration testing. Please do not abuse them.
arpredirect redirect packets from a target host (or all hosts) on the LAN
intended for another host on the LAN by forging ARP replies
findgw determine the local gateway of an unknown network via passive
sniffing
macof flood the local network with random MAC addresses
dsniff simple password sniffer
arpspoof redirect packets from a target host (or all hosts) on the LAN
intended for another host on the LAN by forging ARP replies.
dnsspoof forge replies to arbitrary DNS address / pointer queries on
the LAN.
dsniff simple password sniffer.
filesnarf saves selected files sniffed from NFS traffic in the current
working directory.
macof flood the local network with random MAC addresses.
mailsnarf a fast and easy way to violate the Electronic Communications
Privacy Act of 1986 (18 USC 2701-2711), be careful
Privacy Act of 1986 (18 USC 2701-2711), be careful.
msgsnarf record selected messages from sniffed AOL Instant Messenger,
ICQ 2000, IRC, and Yahoo! Messenger chat sessions.
sshmitm SSH monkey-in-the-middle.
tcpkill kills specified in-progress TCP connections.
tcpnice slow down specified TCP connections via "active" traffic
shaping.
urlsnarf output all requested URLs sniffed from HTTP traffic in CLF
(Common Log Format, used by almost all web servers), suitable
for offline post-processing
webmitm HTTP / HTTPS monkey-in-the-middle.
webspy sends URLs sniffed from a client to your local Netscape
browser for display, a fun party trick
WWW: http://www.monkey.org/~dugsong/
WWW: http://www.monkey.org/~dugsong/dsniff/

View File

@ -1,12 +1,16 @@
lib/dsniff.magic
lib/dsniff.services
sbin/arpredirect
lib/dnsspoof.hosts
sbin/arpspoof
sbin/dnsspoof
sbin/dsniff
sbin/filesnarf
sbin/macof
sbin/mailsnarf
sbin/msgsnarf
sbin/sshmitm
sbin/tcpkill
sbin/tcpnice
sbin/urlsnarf
sbin/webmitm
sbin/webspy