Index: head/net-mgmt/Makefile =================================================================== --- head/net-mgmt/Makefile +++ head/net-mgmt/Makefile @@ -55,6 +55,7 @@ SUBDIR += dhcdrop SUBDIR += dhcp_probe SUBDIR += disco + SUBDIR += dnsmap SUBDIR += docsis SUBDIR += driftnet SUBDIR += ehnt Index: head/net-mgmt/dnsmap/Makefile =================================================================== --- head/net-mgmt/dnsmap/Makefile +++ head/net-mgmt/dnsmap/Makefile @@ -0,0 +1,32 @@ +# Created by: Rihaz Jerrin +# $FreeBSD$ + +PORTNAME= dnsmap +PORTVERSION= 0.30 +DISTVERSIONPREFIX= v +CATEGORIES= net-mgmt + +MAINTAINER= rihaz.jerrin@gmail.com +COMMENT= DNS domain name brute forcing tool + +LICENSE= GPLv2 + +USE_GITHUB= yes +GH_ACCOUNT= lifanov + +PORTDOCS= Changelog.txt README.txt CREDITS.txt use_cases.txt + +PLIST_FILES= bin/dnsmap bin/dnsmap-bulk ${DATADIR}/wordlist_TLAs.txt + +do-build: + ${CC} ${CFLAGS} ${WRKSRC}/dnsmap.c -o ${WRKSRC}/dnsmap + +do-install: + ${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin/${PORTNAME} + ${INSTALL_SCRIPT} ${WRKSRC}/${PORTNAME}-bulk.sh ${STAGEDIR}${PREFIX}/bin/${PORTNAME}-bulk + ${MKDIR} ${STAGEDIR}${DATADIR} + ${INSTALL_DATA} ${WRKSRC}/wordlist_TLAs.txt ${STAGEDIR}${DATADIR} + ${MKDIR} ${STAGEDIR}${DOCSDIR} + ${INSTALL_DATA} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR} + +.include Index: head/net-mgmt/dnsmap/distinfo =================================================================== --- head/net-mgmt/dnsmap/distinfo +++ head/net-mgmt/dnsmap/distinfo @@ -0,0 +1,3 @@ +TIMESTAMP = 1483716371 +SHA256 (lifanov-dnsmap-v0.30_GH0.tar.gz) = 3b6b34566b89eb464e643d6af1d0c005c9bbc1bcc3ee50aaf2baf101615a5e93 +SIZE (lifanov-dnsmap-v0.30_GH0.tar.gz) = 72946 Index: head/net-mgmt/dnsmap/files/patch-dnsmap-bulk.sh =================================================================== --- head/net-mgmt/dnsmap/files/patch-dnsmap-bulk.sh +++ head/net-mgmt/dnsmap/files/patch-dnsmap-bulk.sh @@ -0,0 +1,23 @@ +--- dnsmap-bulk.sh.orig 2016-04-11 23:06:01 UTC ++++ dnsmap-bulk.sh +@@ -1,5 +1,5 @@ +-#!/bin/bash +-if [[ $# -ne 1 && $# -ne 2 ]] ++#!/bin/sh ++if [ $# -ne 1 -a $# -ne 2 ] + then + echo "usage: `basename $0` [results-path]"; + echo "e.g.:"; +@@ -9,10 +9,10 @@ then + fi + for i in `cat $1` + do +- if [[ $# -eq 1 ]] ++ if [ $# -eq 1 ] + then + dnsmap $i +- elif [[ $# -eq 2 ]] ++ elif [ $# -eq 2 ] + then + dnsmap $i -r $2 + fi Index: head/net-mgmt/dnsmap/pkg-descr =================================================================== --- head/net-mgmt/dnsmap/pkg-descr +++ head/net-mgmt/dnsmap/pkg-descr @@ -0,0 +1,18 @@ +dnsmap was originally released back in 2006 and +was inspired by the fictional story "The Thief +No One Saw" by Paul Craig, which can be found +in the book "Stealing the Network - How to 0wn the Box". + +dnsmap is mainly meant to be used by pentesters +during the information gathering/enumeration phase +of infrastructure security assessments. During the +enumeration stage, the security consultant would +typically discover the target company's IP netblocks, +domain names, phone numbers, etc ... + +Subdomain brute-forcing is another technique that +should be used in the enumeration stage, as it's +especially useful when other domain enumeration +techniques such as zone transfers don't work. + +WWW: http://tools.kali.org/information-gathering/dnsmap