diff options
author | Dmitry Marakasov <amdmi3@FreeBSD.org> | 2017-07-13 09:00:21 +0000 |
---|---|---|
committer | Dmitry Marakasov <amdmi3@FreeBSD.org> | 2017-07-13 09:00:21 +0000 |
commit | d80826b054622174197879186b402fab4180b1df (patch) | |
tree | a9894df5a09ce5fe7d2877234c35c79c18733bb7 /net-mgmt | |
parent | a0e281720e1e0e9a39bcb2c8f78d7796b29d61b3 (diff) | |
download | ports-d80826b054622174197879186b402fab4180b1df.tar.gz ports-d80826b054622174197879186b402fab4180b1df.zip |
- Fix LICENSE
- Add LICENSE_FILE
- Update WWW
- Cleanup trailing whitespace in pkg-descr
Approved by: portmgr blanket
Notes
Notes:
svn path=/head/; revision=445638
Diffstat (limited to 'net-mgmt')
-rw-r--r-- | net-mgmt/dnsmap/Makefile | 3 | ||||
-rw-r--r-- | net-mgmt/dnsmap/pkg-descr | 22 |
2 files changed, 13 insertions, 12 deletions
diff --git a/net-mgmt/dnsmap/Makefile b/net-mgmt/dnsmap/Makefile index 0cd55144614a..2c8a456a4196 100644 --- a/net-mgmt/dnsmap/Makefile +++ b/net-mgmt/dnsmap/Makefile @@ -9,7 +9,8 @@ CATEGORIES= net-mgmt MAINTAINER= rihaz.jerrin@gmail.com COMMENT= DNS domain name brute forcing tool -LICENSE= GPLv2 +LICENSE= GPLv2+ +LICENSE_FILE= ${WRKSRC}/gpl-2.0.txt USE_GITHUB= yes GH_ACCOUNT= lifanov diff --git a/net-mgmt/dnsmap/pkg-descr b/net-mgmt/dnsmap/pkg-descr index 7909ecf0cfdb..0aab3f89ddb0 100644 --- a/net-mgmt/dnsmap/pkg-descr +++ b/net-mgmt/dnsmap/pkg-descr @@ -1,18 +1,18 @@ -dnsmap was originally released back in 2006 and -was inspired by the fictional story "The Thief -No One Saw" by Paul Craig, which can be found +dnsmap was originally released back in 2006 and +was inspired by the fictional story "The Thief +No One Saw" by Paul Craig, which can be found in the book "Stealing the Network - How to 0wn the Box". -dnsmap is mainly meant to be used by pentesters -during the information gathering/enumeration phase -of infrastructure security assessments. During the -enumeration stage, the security consultant would +dnsmap is mainly meant to be used by pentesters +during the information gathering/enumeration phase +of infrastructure security assessments. During the +enumeration stage, the security consultant would typically discover the target company's IP netblocks, domain names, phone numbers, etc ... -Subdomain brute-forcing is another technique that -should be used in the enumeration stage, as it's -especially useful when other domain enumeration +Subdomain brute-forcing is another technique that +should be used in the enumeration stage, as it's +especially useful when other domain enumeration techniques such as zone transfers don't work. -WWW: http://tools.kali.org/information-gathering/dnsmap +WWW: https://tools.kali.org/information-gathering/dnsmap |