summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authoredwin <edwin@FreeBSD.org>2003-04-02 11:04:08 +0000
committeredwin <edwin@FreeBSD.org>2003-04-02 11:04:08 +0000
commitacc6f2a4708e8746b914f0e37ccd850a720f690a (patch)
tree3c527198e4809521bc822b97b0dc36e721180c9c /security
parentfe81117791ab37062781c1335c86094e93e46e6a (diff)
downloadFreeBSD-ports-acc6f2a4708e8746b914f0e37ccd850a720f690a.zip
FreeBSD-ports-acc6f2a4708e8746b914f0e37ccd850a720f690a.tar.gz
New port: security/finger_mysql - A threaded MySQL scanner
This is a one-file-port of a threaded MySQL scanner. If the user "root" is passwordless, then this is even funnier. For some reason is segfaults if you feed it with Class B network, but I'll fix that when time permits. PR: ports/48924 Submitted by: Yonatan@xpert.com <Yonatan@xpert.com>
Diffstat (limited to 'security')
-rw-r--r--security/Makefile1
-rw-r--r--security/finger_mysql/Makefile34
-rw-r--r--security/finger_mysql/distinfo1
-rw-r--r--security/finger_mysql/pkg-descr5
-rw-r--r--security/finger_mysql/pkg-plist1
5 files changed, 42 insertions, 0 deletions
diff --git a/security/Makefile b/security/Makefile
index d313824..e415bf4 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -56,6 +56,7 @@
SUBDIR += fakeident
SUBDIR += find-zlib
SUBDIR += find_ddos
+ SUBDIR += finger_mysql
SUBDIR += firewalk
SUBDIR += flawfinder
SUBDIR += fpm
diff --git a/security/finger_mysql/Makefile b/security/finger_mysql/Makefile
new file mode 100644
index 0000000..e5a69c4
--- /dev/null
+++ b/security/finger_mysql/Makefile
@@ -0,0 +1,34 @@
+# Ports collection makefile for: finger_mysql
+# Date created: 03 Mar 2003
+# Whom: Yonatan <Yonatan@xpert.com>
+#
+# $FreeBSD$
+#
+
+PORTNAME= finger_mysql
+PORTVERSION= 1.0
+CATEGORIES= security
+MASTER_SITES= http://www.fsix.net/crew/ \
+ http://www.zone-h.org/files/49/ \
+ http://downloads.securityfocus.com/vulnerabilities/exploits/
+DISTNAME= finger_mysql.c
+EXTRACT_SUFX= #none
+EXTRACT_ONLY= #none
+
+MAINTAINER= Yonatan@xpert.com
+COMMENT= Threaded MySQL scanner
+
+LIB_DEPENDS= mysqlclient:${PORTSDIR}/databases/mysql323-client/
+
+NO_WRKSUBDIR= yes
+
+post-extract:
+ ${CP} ${DISTDIR}/${DISTNAME} ${WRKSRC}/
+
+do-build:
+ ${CC} ${CFLAGS} -L${PREFIX}/lib/mysql -I${PREFIX}/include ${PTHREAD_LIBS} -lmysqlclient -o ${WRKSRC}/finger_mysql ${WRKSRC}/${DISTNAME}
+
+do-install:
+ ${INSTALL_PROGRAM} ${WRKSRC}/finger_mysql ${PREFIX}/bin
+
+.include <bsd.port.mk>
diff --git a/security/finger_mysql/distinfo b/security/finger_mysql/distinfo
new file mode 100644
index 0000000..88e6610
--- /dev/null
+++ b/security/finger_mysql/distinfo
@@ -0,0 +1 @@
+MD5 (finger_mysql.c) = 780669d83a76c63f40efab6e34716508
diff --git a/security/finger_mysql/pkg-descr b/security/finger_mysql/pkg-descr
new file mode 100644
index 0000000..62b0cd4
--- /dev/null
+++ b/security/finger_mysql/pkg-descr
@@ -0,0 +1,5 @@
+This is a threaded C class IP MySQL scanner that will attempt to login
+and extract the hashes from a vulnerable MySQL daemon. See
+http://online.securityfocus.com/bid/5503 for all the details.
+
+WWW: http://www.fsix.net/crew
diff --git a/security/finger_mysql/pkg-plist b/security/finger_mysql/pkg-plist
new file mode 100644
index 0000000..243f200
--- /dev/null
+++ b/security/finger_mysql/pkg-plist
@@ -0,0 +1 @@
+bin/finger_mysql
OpenPOWER on IntegriCloud