mirror of
https://github.com/pentoo/pentoo-overlay
synced 2026-05-02 19:50:51 +02:00
sipvicious: 0.3.0 bump
This commit is contained in:
parent
134faa5711
commit
25cc68c6a5
5 changed files with 21 additions and 271 deletions
1
net-analyzer/sipvicious/Manifest
Normal file
1
net-analyzer/sipvicious/Manifest
Normal file
|
|
@ -0,0 +1 @@
|
|||
DIST v0.3.0.tar.gz 43097 BLAKE2B 5ddcdf775db0ade6e61e77009c7991d8523db02dbdd6e8588c23f5cd6f4d2868dd1d78e7f17322cde67414b4eb2b8c89f2d4ee0079487e5f5f7ee75f4759adf5 SHA512 35aa3ea7d3cfd6f84716cd95a263357881196eaa180375d1f0a392a1478292ba9a8bf6cd53888448523f7faa447c82cc43fb1ef6c105a0e93e6c7854a51da172
|
||||
|
|
@ -1,69 +0,0 @@
|
|||
diff -Naur sipvicious-0.2.4.orig/svfphelper.py sipvicious-0.2.4/fphelper.py
|
||||
--- sipvicious-0.2.4.orig/svfphelper.py 2008-08-10 16:20:18.000000000 +0000
|
||||
+++ sipvicious-0.2.4/svfphelper.py 2008-12-02 14:58:22.000000000 +0000
|
||||
@@ -70,7 +70,7 @@
|
||||
cPickle.dump(dynamicmatch,output)
|
||||
output.close()
|
||||
|
||||
-def fpdynamicstore(servername,regex,fpfile="totag"):
|
||||
+def fpdynamicstore(servername,regex,fpfile="/usr/lib/sipvicious/totag"):
|
||||
import shelve,os,logging
|
||||
log = logging.getLogger('fpdynamicstore')
|
||||
if regex is not None:
|
||||
@@ -82,7 +82,7 @@
|
||||
except OSError:
|
||||
return
|
||||
|
||||
-def fpexists(fpname,fpfile="totag"):
|
||||
+def fpexists(fpname,fpfile="/usr/lib/sipvicious/totag"):
|
||||
import shelve,logging
|
||||
log = logging.getLogger("fpexists")
|
||||
try:
|
||||
@@ -95,7 +95,7 @@
|
||||
dynamicmatch.close()
|
||||
return r
|
||||
|
||||
-def fpdynamic(dyn,fpfile="totag"):
|
||||
+def fpdynamic(dyn,fpfile="/usr/lib/sipvicious/totag"):
|
||||
import shelve
|
||||
import logging
|
||||
log = logging.getLogger("fpdynamic")
|
||||
@@ -147,7 +147,7 @@
|
||||
orderhash = ''
|
||||
return totalhashed,orderhash,hashedheaders
|
||||
|
||||
-def fpstatic(buffer,fullfn='staticfull',headersfn='staticheaders'):
|
||||
+def fpstatic(buffer,fullfn='/usr/lib/sipvicious/staticfull',headersfn='/usr/lib/sipvicious/staticheaders'):
|
||||
totalhashed,orderhashed,hashedheaders = hashstatic(buffer)
|
||||
import shelve
|
||||
fulldb = shelve.open(fullfn,writeback=True)
|
||||
@@ -184,7 +184,7 @@
|
||||
return True
|
||||
|
||||
|
||||
-def fpstore(servername,fullhash,headerhashes,fullfn='staticfull',headersfn='staticheaders'):
|
||||
+def fpstore(servername,fullhash,headerhashes,fullfn='/usr/lib/sipvicious/staticfull',headersfn='/usr/lib/sipvicious/staticheaders'):
|
||||
import shelve,logging
|
||||
log = logging.getLogger("fpstore")
|
||||
fulldb = shelve.open(fullfn)
|
||||
@@ -298,7 +298,7 @@
|
||||
splitbuff = buff.split(SEP,2)
|
||||
return(splitbuff[0])
|
||||
|
||||
-def groupwherepossible(fpnames,groupdb='groupdb'):
|
||||
+def groupwherepossible(fpnames,groupdb='/usr/lib/sipvicious/groupdb'):
|
||||
import shelve, logging, re
|
||||
log = logging.getLogger('grouphwerepossible')
|
||||
log.debug("entered")
|
||||
diff -Naur sipvicious-0.2.4.orig/svhelper.py sipvicious-0.2.4/helper.py
|
||||
--- sipvicious-0.2.4.orig/svhelper.py 2008-08-10 16:20:18.000000000 +0000
|
||||
+++ sipvicious-0.2.4/svhelper.py 2008-12-02 14:51:06.000000000 +0000
|
||||
@@ -818,7 +818,7 @@
|
||||
prefix='| ', postfix=' |',wrapfunc=lambda x: wrap_onspace(x,width))
|
||||
return o
|
||||
|
||||
-def outputtoxml(title,labels,db,resdb=None,xsl='sv.xsl'):
|
||||
+def outputtoxml(title,labels,db,resdb=None,xsl='/usr/lib/sipvicious/sv.xsl'):
|
||||
from xml.sax.saxutils import escape
|
||||
o = '<?xml version="1.0" ?>\r\n'
|
||||
o += '<?xml-stylesheet type="text/xsl" href="%s"?>\r\n' % escape(xsl)
|
||||
|
|
@ -1,163 +0,0 @@
|
|||
diff -urN sipvicious.orig/libs/svhelper.py sipvicious/libs/svhelper.py
|
||||
--- sipvicious.orig/libs/svhelper.py 2012-12-10 20:38:17.000000000 +0800
|
||||
+++ sipvicious/libs/svhelper.py 2012-12-12 22:33:29.884627515 +0800
|
||||
@@ -772,7 +772,7 @@
|
||||
listresult = dict()
|
||||
for sessiontype in sessiontypes:
|
||||
if chosensessiontype in [None,sessiontype]:
|
||||
- p = os.path.join('.sipvicious',sessiontype)
|
||||
+ p = os.path.join(os.path.expanduser('~'),'.sipvicious',sessiontype)
|
||||
if os.path.exists(p):
|
||||
listresult[sessiontype] = os.listdir(p)
|
||||
return listresult
|
||||
@@ -784,7 +784,7 @@
|
||||
print "Type of scan: %s" % k
|
||||
for r in listresult[k]:
|
||||
sessionstatus = 'Incomplete'
|
||||
- sessionpath=os.path.join('.sipvicious',k,r)
|
||||
+ sessionpath=os.path.join(os.path.expanduser('~'),'.sipvicious',k,r)
|
||||
dblen = ''
|
||||
if count:
|
||||
if k == 'svmap':
|
||||
@@ -809,11 +809,11 @@
|
||||
sessionpath = list()
|
||||
if chosensessiontype is None:
|
||||
for sessiontype in sessiontypes:
|
||||
- p = os.path.join('.sipvicious',sessiontype,chosensession)
|
||||
+ p = os.path.join(os.path.expanduser('~'),'.sipvicious',sessiontype,chosensession)
|
||||
if os.path.exists(p):
|
||||
sessionpath.append(p)
|
||||
else:
|
||||
- p = os.path.join('.sipvicious',chosensessiontype,chosensession)
|
||||
+ p = os.path.join(os.path.expanduser('~'),'.sipvicious',chosensessiontype,chosensession)
|
||||
if os.path.exists(p):
|
||||
sessionpath.append(p)
|
||||
if len(sessionpath) == 0:
|
||||
@@ -898,7 +898,7 @@
|
||||
if sessiontype is None:
|
||||
log.debug('sessiontype is not specified')
|
||||
for sessiontype in sessiontypes:
|
||||
- p = os.path.join('.sipvicious',sessiontype,session)
|
||||
+ p = os.path.join(os.path.expanduser('~'),'.sipvicious',sessiontype,session)
|
||||
log.debug('trying %s' % p)
|
||||
if os.path.exists(p):
|
||||
log.debug('%s exists')
|
||||
@@ -906,7 +906,7 @@
|
||||
sessionpath = p
|
||||
break
|
||||
else:
|
||||
- p = os.path.join('.sipvicious',sessiontype,session)
|
||||
+ p = os.path.join(os.path.expanduser('~'),'.sipvicious',sessiontype,session)
|
||||
if os.path.exists(p):
|
||||
sessionpath = p
|
||||
if sessionpath is None:
|
||||
diff -urN sipvicious.orig/svcrack.py sipvicious/svcrack.py
|
||||
--- sipvicious.orig/svcrack.py 2012-12-10 20:38:17.000000000 +0800
|
||||
+++ sipvicious/svcrack.py 2012-12-12 22:37:26.677638967 +0800
|
||||
@@ -369,7 +369,7 @@
|
||||
logging.basicConfig(level=calcloglevel(options))
|
||||
logging.debug('started logging')
|
||||
if options.resume is not None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.resume)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.resume)
|
||||
if os.path.exists(os.path.join(exportpath,'closed')):
|
||||
logging.error("Cannot resume a session that is complete")
|
||||
exit(1)
|
||||
@@ -383,11 +383,11 @@
|
||||
options.resume = previousresume
|
||||
options.verbose = previousverbose
|
||||
elif options.save is not None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.save)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.save)
|
||||
logging.debug('Session path: %s' % exportpath)
|
||||
|
||||
if options.resume is not None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.resume)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.resume)
|
||||
if not os.path.exists(exportpath):
|
||||
logging.critical('A session with the name %s was not found'% options.resume)
|
||||
exit(1)
|
||||
@@ -398,7 +398,7 @@
|
||||
options.resume = previousresume
|
||||
options.verbose = previousverbose
|
||||
elif options.save is not None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.save)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.save)
|
||||
if len(args) != 1:
|
||||
parser.error("provide one hostname")
|
||||
else:
|
||||
@@ -435,7 +435,7 @@
|
||||
crackargs = (rangelist,options.zeropadding,options.template,options.defaults,[options.username])
|
||||
if options.save is not None:
|
||||
if options.resume is None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.save)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.save)
|
||||
if os.path.exists(exportpath):
|
||||
logging.warn('we found a previous scan with the same name. Please choose a new session name')
|
||||
exit(1)
|
||||
diff -urN sipvicious.orig/svmap.py sipvicious/svmap.py
|
||||
--- sipvicious.orig/svmap.py 2012-12-10 20:38:17.000000000 +0800
|
||||
+++ sipvicious/svmap.py 2012-12-12 22:44:17.333658837 +0800
|
||||
@@ -334,7 +334,7 @@
|
||||
ip4range, resumeFromIP, scanfromdb, dbexists, getTargetFromSRV
|
||||
exportpath = None
|
||||
if options.resume is not None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.resume)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.resume)
|
||||
if os.path.exists(os.path.join(exportpath,'closed')):
|
||||
logging.error("Cannot resume a session that is complete")
|
||||
exit(1)
|
||||
@@ -348,12 +348,12 @@
|
||||
options.resume = previousresume
|
||||
options.verbose = previousverbose
|
||||
elif options.save is not None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.save)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.save)
|
||||
logging.basicConfig(level=calcloglevel(options))
|
||||
logging.debug('started logging')
|
||||
scanrandomstore = None
|
||||
if options.input is not None:
|
||||
- db = os.path.join('.sipvicious',__prog__,options.input,'resultua')
|
||||
+ db = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.input,'resultua')
|
||||
if dbexists(db):
|
||||
scaniter = scanfromdb(db,options.method.split(','))
|
||||
else:
|
||||
@@ -453,7 +453,7 @@
|
||||
scaniter = scanlist(iprange,portrange,options.method.split(','))
|
||||
if options.save is not None:
|
||||
if options.resume is None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.save)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.save)
|
||||
if os.path.exists(exportpath):
|
||||
logging.warn('we found a previous scan with the same name. Please choose a new session name')
|
||||
exit(1)
|
||||
diff -urN sipvicious.orig/svwar.py sipvicious/svwar.py
|
||||
--- sipvicious.orig/svwar.py 2012-12-10 20:38:17.000000000 +0800
|
||||
+++ sipvicious/svwar.py 2012-12-12 22:43:12.557655690 +0800
|
||||
@@ -491,7 +491,7 @@
|
||||
logging.critical("The format string template is not correct. Please provide an appropiate one")
|
||||
exit(1)
|
||||
if options.resume is not None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.resume)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.resume)
|
||||
if os.path.exists(os.path.join(exportpath,'closed')):
|
||||
logging.error("Cannot resume a session that is complete")
|
||||
exit(1)
|
||||
@@ -505,7 +505,7 @@
|
||||
options.resume = previousresume
|
||||
options.verbose = previousverbose
|
||||
elif options.save is not None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.save)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.save)
|
||||
if len(args) != 1:
|
||||
parser.error("provide one hostname")
|
||||
else:
|
||||
@@ -539,7 +539,7 @@
|
||||
guessargs = (extensionstotry,options.zeropadding,options.template,options.defaults)
|
||||
if options.save is not None:
|
||||
if options.resume is None:
|
||||
- exportpath = os.path.join('.sipvicious',__prog__,options.save)
|
||||
+ exportpath = os.path.join(os.path.expanduser('~'),'.sipvicious',__prog__,options.save)
|
||||
if os.path.exists(exportpath):
|
||||
logging.warn('we found a previous scan with the same name. Please choose a new session name')
|
||||
exit(1)
|
||||
|
|
@ -1,39 +0,0 @@
|
|||
# Copyright 1999-2015 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Id$
|
||||
|
||||
EAPI="5"
|
||||
|
||||
PYTHON_COMPAT=( python2_7 )
|
||||
inherit eutils python-single-r1 git-r3
|
||||
|
||||
DESCRIPTION="A voip pentest tools suite"
|
||||
HOMEPAGE="http://code.google.com/p/sipvicious/"
|
||||
EGIT_REPO_URI="https://github.com/EnableSecurity/sipvicious.git"
|
||||
EGIT_COMMIT="v0.2.8"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="~amd64 ~ppc ~x86"
|
||||
IUSE="pdf"
|
||||
|
||||
DEPEND=""
|
||||
RDEPEND="pdf? ( dev-python/reportlab )"
|
||||
|
||||
src_prepare() {
|
||||
epatch "${FILESDIR}"/"${P}"-path.patch
|
||||
find ./ -name .svn | xargs rm -r
|
||||
}
|
||||
|
||||
src_install() {
|
||||
dodir /usr/share/${PN}
|
||||
dodoc Changelog README.md THANKS TODO
|
||||
rm -f Changelog README.md THANKS TODO
|
||||
chmod 655 svcrash.py
|
||||
cp -pPR * "${ED}"usr/share/${PN}/ || die
|
||||
chown -R root:0 "${ED}"
|
||||
for file in svmap.py svwar.py svcrack.py svreport.py svcrash.py; do
|
||||
dosym /usr/share/${PN}/${file} /usr/bin/${file%%.*}
|
||||
done
|
||||
python_fix_shebang "${ED}"usr/share/${PN}
|
||||
}
|
||||
20
net-analyzer/sipvicious/sipvicious-0.3.0.ebuild
Normal file
20
net-analyzer/sipvicious/sipvicious-0.3.0.ebuild
Normal file
|
|
@ -0,0 +1,20 @@
|
|||
# Copyright 1999-2020 Gentoo Authors
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
|
||||
EAPI=7
|
||||
|
||||
PYTHON_COMPAT=( python3_{6,7} )
|
||||
inherit eutils distutils-r1
|
||||
|
||||
DESCRIPTION="A voip pentest tools suite"
|
||||
HOMEPAGE="https://github.com/EnableSecurity/sipvicious"
|
||||
SRC_URI="https://github.com/EnableSecurity/sipvicious/archive/v0.3.0.tar.gz"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="~amd64 ~x86"
|
||||
IUSE="pdf"
|
||||
|
||||
RDEPEND="pdf? ( dev-python/reportlab )"
|
||||
DEPEND="${RDEPEND}
|
||||
dev-python/setuptools[${PYTHON_USEDEP}]"
|
||||
Loading…
Reference in a new issue