diff options
-rw-r--r-- | net-mgmt/dnsmap/Makefile | 3 | ||||
-rw-r--r-- | net-mgmt/dnsmap/pkg-descr | 22 |
2 files changed, 13 insertions, 12 deletions
diff --git a/net-mgmt/dnsmap/Makefile b/net-mgmt/dnsmap/Makefile index 0cd55144614a..2c8a456a4196 100644 --- a/net-mgmt/dnsmap/Makefile +++ b/net-mgmt/dnsmap/Makefile @@ -9,7 +9,8 @@ CATEGORIES= net-mgmt MAINTAINER= rihaz.jerrin@gmail.com COMMENT= DNS domain name brute forcing tool -LICENSE= GPLv2 +LICENSE= GPLv2+ +LICENSE_FILE= ${WRKSRC}/gpl-2.0.txt USE_GITHUB= yes GH_ACCOUNT= lifanov diff --git a/net-mgmt/dnsmap/pkg-descr b/net-mgmt/dnsmap/pkg-descr index 7909ecf0cfdb..0aab3f89ddb0 100644 --- a/net-mgmt/dnsmap/pkg-descr +++ b/net-mgmt/dnsmap/pkg-descr @@ -1,18 +1,18 @@ -dnsmap was originally released back in 2006 and -was inspired by the fictional story "The Thief -No One Saw" by Paul Craig, which can be found +dnsmap was originally released back in 2006 and +was inspired by the fictional story "The Thief +No One Saw" by Paul Craig, which can be found in the book "Stealing the Network - How to 0wn the Box". -dnsmap is mainly meant to be used by pentesters -during the information gathering/enumeration phase -of infrastructure security assessments. During the -enumeration stage, the security consultant would +dnsmap is mainly meant to be used by pentesters +during the information gathering/enumeration phase +of infrastructure security assessments. During the +enumeration stage, the security consultant would typically discover the target company's IP netblocks, domain names, phone numbers, etc ... -Subdomain brute-forcing is another technique that -should be used in the enumeration stage, as it's -especially useful when other domain enumeration +Subdomain brute-forcing is another technique that +should be used in the enumeration stage, as it's +especially useful when other domain enumeration techniques such as zone transfers don't work. -WWW: http://tools.kali.org/information-gathering/dnsmap +WWW: https://tools.kali.org/information-gathering/dnsmap |