aboutsummaryrefslogtreecommitdiff
path: root/net-mgmt
diff options
context:
space:
mode:
authorDmitry Marakasov <amdmi3@FreeBSD.org>2017-07-13 09:00:21 +0000
committerDmitry Marakasov <amdmi3@FreeBSD.org>2017-07-13 09:00:21 +0000
commitd80826b054622174197879186b402fab4180b1df (patch)
treea9894df5a09ce5fe7d2877234c35c79c18733bb7 /net-mgmt
parenta0e281720e1e0e9a39bcb2c8f78d7796b29d61b3 (diff)
downloadports-d80826b054622174197879186b402fab4180b1df.tar.gz
ports-d80826b054622174197879186b402fab4180b1df.zip
- Fix LICENSE
- Add LICENSE_FILE - Update WWW - Cleanup trailing whitespace in pkg-descr Approved by: portmgr blanket
Notes
Notes: svn path=/head/; revision=445638
Diffstat (limited to 'net-mgmt')
-rw-r--r--net-mgmt/dnsmap/Makefile3
-rw-r--r--net-mgmt/dnsmap/pkg-descr22
2 files changed, 13 insertions, 12 deletions
diff --git a/net-mgmt/dnsmap/Makefile b/net-mgmt/dnsmap/Makefile
index 0cd55144614a..2c8a456a4196 100644
--- a/net-mgmt/dnsmap/Makefile
+++ b/net-mgmt/dnsmap/Makefile
@@ -9,7 +9,8 @@ CATEGORIES= net-mgmt
MAINTAINER= rihaz.jerrin@gmail.com
COMMENT= DNS domain name brute forcing tool
-LICENSE= GPLv2
+LICENSE= GPLv2+
+LICENSE_FILE= ${WRKSRC}/gpl-2.0.txt
USE_GITHUB= yes
GH_ACCOUNT= lifanov
diff --git a/net-mgmt/dnsmap/pkg-descr b/net-mgmt/dnsmap/pkg-descr
index 7909ecf0cfdb..0aab3f89ddb0 100644
--- a/net-mgmt/dnsmap/pkg-descr
+++ b/net-mgmt/dnsmap/pkg-descr
@@ -1,18 +1,18 @@
-dnsmap was originally released back in 2006 and
-was inspired by the fictional story "The Thief
-No One Saw" by Paul Craig, which can be found
+dnsmap was originally released back in 2006 and
+was inspired by the fictional story "The Thief
+No One Saw" by Paul Craig, which can be found
in the book "Stealing the Network - How to 0wn the Box".
-dnsmap is mainly meant to be used by pentesters
-during the information gathering/enumeration phase
-of infrastructure security assessments. During the
-enumeration stage, the security consultant would
+dnsmap is mainly meant to be used by pentesters
+during the information gathering/enumeration phase
+of infrastructure security assessments. During the
+enumeration stage, the security consultant would
typically discover the target company's IP netblocks,
domain names, phone numbers, etc ...
-Subdomain brute-forcing is another technique that
-should be used in the enumeration stage, as it's
-especially useful when other domain enumeration
+Subdomain brute-forcing is another technique that
+should be used in the enumeration stage, as it's
+especially useful when other domain enumeration
techniques such as zone transfers don't work.
-WWW: http://tools.kali.org/information-gathering/dnsmap
+WWW: https://tools.kali.org/information-gathering/dnsmap