upgrade to 2.0, fake

This commit is contained in:
dugsong 2000-05-17 16:32:08 +00:00
parent 474d7b5485
commit 8b08eced88
5 changed files with 10 additions and 73 deletions

View File

@ -3,13 +3,11 @@
# Date created: 17 Dec 1999
# Whom: dugsong@monkey.org
#
# $OpenBSD: Makefile,v 1.9 2000/04/18 10:08:23 turan Exp $
# $OpenBSD: Makefile,v 1.10 2000/05/17 16:32:08 dugsong Exp $
DISTNAME= dsniff-1.5
DISTNAME= dsniff-2.0
CATEGORIES= security
NEED_VERSION= 1.230
FAKE=No
MAINTAINER= dugsong@monkey.org
@ -27,4 +25,7 @@ GNU_CONFIGURE= Yes
NO_PATCH= Yes
FAKE= Yes
FAKE_FLAGS= install_prefix=${WRKINST}
.include <bsd.port.mk>

View File

@ -1,3 +1,3 @@
MD5 (dsniff-1.5.tar.gz) = 7df8aa33816cabf1f3e3dce8c21d818c
RMD160 (dsniff-1.5.tar.gz) = b3006a8f7ee24aa0be0cf18c6b3ce77f15648f14
SHA1 (dsniff-1.5.tar.gz) = 33e43979cd311318925030225841b70762060c79
MD5 (dsniff-2.0.tar.gz) = d62f7ac6d1719d0463744712715001d7
RMD160 (dsniff-2.0.tar.gz) = 3561385f82cbaa60cdb5ec6ffc4748d53a7f7633
SHA1 (dsniff-2.0.tar.gz) = d3bb9c9335fac334c0cbc4f42c25e5d8261688d7

View File

@ -1 +1 @@
various sniffing utilities for penetration testing
simple password sniffer

View File

@ -1,65 +1,3 @@
dsniff
------
simple password sniffer, plus sniffing utilities for penetration testing
arpredirect
redirect packets from a target host (or all hosts) on the LAN
intended for another host on the LAN by forging ARP replies.
this is an extremely effective way of sniffing traffic on a
switch. kernel IP forwarding (or a userland program which
accomplishes the same, e.g. fragrouter :-) must be turned on
ahead of time.
findgw
determine the local gateway of an unknown network via passive
sniffing.
macof
flood the local network with random MAC addresses (causing
some switches to fail open in repeating mode, facilitating
sniffing). a straight C port of the original Perl Net::RawIP
macof program.
tcpkill
kill specified in-progress TCP connections (useful for
libnids-based applications which require a full TCP 3-whs for
TCB creation).
tcpnice
slow down specified in-progress TCP connections via "active"
traffic shaping (useful for sniffing fast networks). forges
tiny TCP window advertisements, and optionally ICMP source
quench replies.
dsniff
simple password sniffer. handles FTP, Telnet, HTTP, POP, IMAP,
SNMP, Rlogin, NFS, X11 auth info. goes beyond most sniffers in
that it minimally parses each application protocol, only
saving the "interesting" bits. uses Berkeley DB as its output
file format, logging only unique auth info. supports full
TCP/IP reassembly, courtesy of libnids (all of the following
tools do, as well).
mailsnarf
a fast and easy way to violate the Electronic Communications
Privacy Act of 1986 (18 USC 2701-2711), be careful. outputs
all messages sniffed from SMTP traffic in Berkeley mbox
format, suitable for offline browsing with your favorite mail
reader (mail -f, pine, etc.).
urlsnarf
output all requested URLs sniffed from HTTP traffic in CLF
(Common Log Format, used by almost all web servers), suitable
for offline post-processing with your favorite web log
analysis tool (analog, wwwstat, etc.).
webspy
sends URLs sniffed from a client to your local Netscape
browser for display, updated in real-time (as the target
surfs, your browser surfs along with them, automagically).
a fun party trick. :-)
-d.
---
http://www.monkey.org/~dugsong/

View File

@ -1,5 +1,4 @@
sbin/arpredirect
sbin/findgw
sbin/macof
sbin/dsniff
sbin/mailsnarf
@ -8,7 +7,6 @@ sbin/tcpnice
sbin/urlsnarf
sbin/webspy
man/man8/arpredirect.8
man/man8/findgw.8
man/man8/macof.8
man/man8/dsniff.8
man/man8/mailsnarf.8