openbsd-ports/net/ettercap/Makefile
mark 3e72aca258 ettercap-0.6.4 update (security fix inside)
0.6.4       20020212

       + You can sniff remote traffic from a romote cisco router
         and make mitm attacks on it using GRE tunnels.
       + Added some bits for the passive OS fingerprint database.
         Now even the length of the packet make sense.
       + The sniffing interface now support JOINED view
       + NEW PLUGIN :
          - thief   (dumps all files from HTTP)
          - zaratan (redirect GRE tunnels)
       + ICQ dissector now search for passwords on all ports
       + Updated the passive OS fingerprint database (675 records)
       + Changed the arg 2 of Plugin_HookPoint for PCK_RECEIVED_RAW
       !! Under OpenBSD the pflog interface is ingored
       !! Fixed the DATA_PATH issue in the phantom plugin
       !! Fixed an unsigned short in state_machine
       !! Fixed some plugins that don't recognize the 'yes' answer
       !! Fixed the plugins symbol problem on Mac OS X (strip -x)
       !! Fixed the possibility of remote exploitation on interface with MTU > 1500
2002-02-16 07:33:22 +00:00

28 lines
604 B
Makefile

# $OpenBSD: Makefile,v 1.13 2002/02/16 07:33:22 mark Exp $
NOT_FOR_ARCHS= ${NO_SHARED_ARCHS}
COMMENT= "multi-purpose sniffer/interceptor/logger"
VER= 0.6.4
DISTNAME= ettercap-${VER}
CATEGORIES= net
NEED_VERSION= 1.500
MASTER_SITES= ${MASTER_SITE_SOURCEFORGE}
MASTER_SITE_SUBDIR= ettercap
HOMEPAGE= http://ettercap.sourceforge.net/
MAINTAINER= Mark Grimes <mark@openbsd.org>
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
USE_GMAKE= Yes
CONFIGURE_STYLE= gnu
CONFIGURE_ARGS+= --enable-https --enable-plugins
.include <bsd.port.mk>