Index: head/net-mgmt/dnsmap/Makefile =================================================================== --- head/net-mgmt/dnsmap/Makefile (revision 445637) +++ head/net-mgmt/dnsmap/Makefile (revision 445638) @@ -1,32 +1,33 @@ # Created by: Rihaz Jerrin # $FreeBSD$ PORTNAME= dnsmap PORTVERSION= 0.30 DISTVERSIONPREFIX= v CATEGORIES= net-mgmt MAINTAINER= rihaz.jerrin@gmail.com COMMENT= DNS domain name brute forcing tool -LICENSE= GPLv2 +LICENSE= GPLv2+ +LICENSE_FILE= ${WRKSRC}/gpl-2.0.txt USE_GITHUB= yes GH_ACCOUNT= lifanov PORTDOCS= Changelog.txt README.txt CREDITS.txt use_cases.txt PLIST_FILES= bin/dnsmap bin/dnsmap-bulk ${DATADIR}/wordlist_TLAs.txt do-build: ${CC} ${CFLAGS} ${WRKSRC}/dnsmap.c -o ${WRKSRC}/dnsmap do-install: ${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin/${PORTNAME} ${INSTALL_SCRIPT} ${WRKSRC}/${PORTNAME}-bulk.sh ${STAGEDIR}${PREFIX}/bin/${PORTNAME}-bulk ${MKDIR} ${STAGEDIR}${DATADIR} ${INSTALL_DATA} ${WRKSRC}/wordlist_TLAs.txt ${STAGEDIR}${DATADIR} ${MKDIR} ${STAGEDIR}${DOCSDIR} ${INSTALL_DATA} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR} .include Index: head/net-mgmt/dnsmap/pkg-descr =================================================================== --- head/net-mgmt/dnsmap/pkg-descr (revision 445637) +++ head/net-mgmt/dnsmap/pkg-descr (revision 445638) @@ -1,18 +1,18 @@ -dnsmap was originally released back in 2006 and -was inspired by the fictional story "The Thief -No One Saw" by Paul Craig, which can be found +dnsmap was originally released back in 2006 and +was inspired by the fictional story "The Thief +No One Saw" by Paul Craig, which can be found in the book "Stealing the Network - How to 0wn the Box". -dnsmap is mainly meant to be used by pentesters -during the information gathering/enumeration phase -of infrastructure security assessments. During the -enumeration stage, the security consultant would +dnsmap is mainly meant to be used by pentesters +during the information gathering/enumeration phase +of infrastructure security assessments. During the +enumeration stage, the security consultant would typically discover the target company's IP netblocks, domain names, phone numbers, etc ... -Subdomain brute-forcing is another technique that -should be used in the enumeration stage, as it's -especially useful when other domain enumeration +Subdomain brute-forcing is another technique that +should be used in the enumeration stage, as it's +especially useful when other domain enumeration techniques such as zone transfers don't work. -WWW: http://tools.kali.org/information-gathering/dnsmap +WWW: https://tools.kali.org/information-gathering/dnsmap