From f8a646328741027a21758f5d286669ed6ec2a8bc Mon Sep 17 00:00:00 2001 From: dugsong Date: Sat, 22 Jan 2000 07:04:30 +0000 Subject: [PATCH] update to dsniff-1.3 --- security/dsniff/Makefile | 4 ++-- security/dsniff/files/md5 | 6 +++--- security/dsniff/pkg/DESCR | 25 ++++++++++++------------- security/dsniff/pkg/PLIST | 2 ++ 4 files changed, 19 insertions(+), 18 deletions(-) diff --git a/security/dsniff/Makefile b/security/dsniff/Makefile index 1ba30f3be7b..169f72afea1 100644 --- a/security/dsniff/Makefile +++ b/security/dsniff/Makefile @@ -3,9 +3,9 @@ # Date created: 17 Dec 1999 # Whom: dugsong@monkey.org # -# $OpenBSD: Makefile,v 1.2 2000/01/09 04:22:34 dugsong Exp $ +# $OpenBSD: Makefile,v 1.3 2000/01/22 07:04:30 dugsong Exp $ -DISTNAME= dsniff-1.2 +DISTNAME= dsniff-1.3 CATEGORIES= security diff --git a/security/dsniff/files/md5 b/security/dsniff/files/md5 index 8334829c2ac..94624301822 100644 --- a/security/dsniff/files/md5 +++ b/security/dsniff/files/md5 @@ -1,3 +1,3 @@ -MD5 (dsniff-1.2.tar.gz) = c4a054c04386d779f58177b7087a2e14 -RMD160 (dsniff-1.2.tar.gz) = e558f93b7552a761963e9b72c78fdfb90c782200 -SHA1 (dsniff-1.2.tar.gz) = fe59143142a6d746e6ed3e70f8b02d25cd590d77 +MD5 (dsniff-1.3.tar.gz) = 3d00725cbf41a12f412b80ddec0b1624 +RMD160 (dsniff-1.3.tar.gz) = fa10af80924ed7da224ae46c96afa129e0f60e53 +SHA1 (dsniff-1.3.tar.gz) = 43a4aaabf19afbe60ee58e6629c1ce814c7b8ec6 diff --git a/security/dsniff/pkg/DESCR b/security/dsniff/pkg/DESCR index a76f4d48620..3727324f4c0 100644 --- a/security/dsniff/pkg/DESCR +++ b/security/dsniff/pkg/DESCR @@ -2,12 +2,6 @@ dsniff ------ -i wrote these tools with honest intentions - to audit my own network, -and to demonstrate the insecurity of plaintext network protocols. -please do not abuse this software. - -what's here: - arpredirect redirect packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies. @@ -18,9 +12,7 @@ arpredirect findgw determine the local gateway of an unknown network via passive - sniffing. the results of this program may be used in - conjunction with arpredirect to intercept all outgoing traffic - on a switch. + sniffing. macof flood the local network with random MAC addresses (causing @@ -28,12 +20,19 @@ macof sniffing). a straight C port of the original Perl Net::RawIP macof program. +tcpkill + kill specified in-progress TCP connections (useful for + libnids-based applications which require a full TCP 3-whs for + TCB creation). + dsniff simple password sniffer. handles FTP, Telnet, HTTP, POP, IMAP, - SNMP, NFS mountd. goes beyond most sniffers in that it - minimally parses each application protocol, only saving the - "interesting" bits. also supports full TCP/IP reassembly, - courtesy of libnids (all of the following tools do, as well). + SNMP, Rlogin, NFS, X11 auth info. goes beyond most sniffers in + that it minimally parses each application protocol, only + saving the "interesting" bits. uses Berkeley DB as its output + file format, logging only unique auth info. supports full + TCP/IP reassembly, courtesy of libnids (all of the following + tools do, as well). mailsnarf a fast and easy way to violate the Electronic Communications diff --git a/security/dsniff/pkg/PLIST b/security/dsniff/pkg/PLIST index 6d7f114c6d7..498f9e982a5 100644 --- a/security/dsniff/pkg/PLIST +++ b/security/dsniff/pkg/PLIST @@ -3,5 +3,7 @@ sbin/findgw sbin/macof sbin/dsniff sbin/mailsnarf +sbin/tcpkill sbin/urlsnarf sbin/webspy +man/man8/dsniff.8