Port details |
- cisco-torch Mass Cisco Vulnerability Scanner
- 0.4 security
=0 0.4Version of this port present on the latest quarterly branch.
- BROKEN: Unfetchable
DEPRECATED: Abandonware, dead upstream This port expired on: 2022-03-31 IGNORE: is marked as broken: Unfetchable
- Maintainer: rihaz.jerrin@gmail.com
- Port Added: 2016-03-14 21:56:17
- Last Update: 2022-03-31 20:31:14
- Commit Hash: 97cf09b
- License: LGPL21
- WWW:
- http://www.hackingciscoexposed.com/?link=tools
- Description:
- Cisco-torch is a mass Cisco Vulnerability Scanner.
The main feature that makes Cisco-torch different from similar
tools is the extensive use of forking to launch multiple scanning
processes on the background for maximum scanning efficiency. Also,
it uses several methods of application layer fingerprinting simultaneously,
if needed. We wanted something fast to discover remote Cisco hosts running
Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks
against the services discovered.
WWW: http://www.hackingciscoexposed.com/?link=tools
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- cisco-torch>0:security/cisco-torch
- No installation instructions:
- This port has been deleted.
- PKGNAME: cisco-torch
- Flavors: there is no flavor information for this port.
- distinfo:
- SHA256 (cisco-torch-0.4b.tar.gz) = a23b90858d17bb85164e210c46b4411e4184f9eb9229ad0dcc30655f23f1023e
SIZE (cisco-torch-0.4b.tar.gz) = 27126
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- perl5>=5.32.r0<5.33 : lang/perl5.32
- Runtime dependencies:
-
- p5-Net-Telnet>=0 : net/p5-Net-Telnet
- p5-Net-SSH2>=0 : net/p5-Net-SSH2
- p5-Net-SNMP>=0 : net-mgmt/p5-Net-SNMP
- p5-Net-SSLeay>=0 : security/p5-Net-SSLeay
- perl5>=5.32.r0<5.33 : lang/perl5.32
- There are no ports dependent upon this port
Configuration Options:
- ===> The following configuration options are available for cisco-torch-0.4:
DOCS=on: Build and/or install documentation
===> Use 'make config' to modify these settings
- Options name:
- security_cisco-torch
- USES:
- perl5 shebangfix
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Port Moves |
- port deleted on 2022-03-31
REASON: Has expired: Abandonware, dead upstream
|
Number of commits found: 8
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
0.4 31 Mar 2022 20:31:14 |
Rene Ladan (rene) |
cleanup: Remove expired ports:
2022-03-31 security/revealrk: Deprecate, marked BROKEN on 12+ in 2018
2022-03-31 devel/apache-commons-modeler: Abandoned upstream, last release in
2013
2022-03-31 security/afl: Abandoned upstream, no new release since 2017. Please
consider using security/afl++ instead
2022-03-31 www/mod_line_edit: Abandoned upstream, last release in 2006, Apache
includes mod_sed
2022-03-31 www/myfaces: Unsupported by upstream, released in 2005
2022-03-31 www/mod_backtrace: Abandoned upstream in 2012 (version 2.0)
2022-03-31 security/base: Broken with PHP 7+, forked here
https://github.com/NathanGibbs3/BASE/
2022-03-31 security/find-zlib: Deprecated, no longer relevant
2022-03-31 security/razorback-clamavNugget: Abandonware, last release in 2012
and listed as alpha quality by upstream
2022-03-31 security/shimmer: Abandonware, last release in 2008
2022-03-31 security/kripp: Abandonware, upstream returns 404 and last release
was back in 2007
2022-03-31 security/ipfilter2dshield: Abandonware, no word of it on upstream web
site
2022-03-31 security/sha: Obsolete, we have tools in base (Only the first 15 lines of the commit message are shown above ) |
0.4 24 Nov 2021 13:50:00 |
Daniel Engberg (diizzy) |
security/*: Deprecate and mark ports BROKEN that are dead upstream and/or
abandonware
security/afl - Migrate to security/afl++
security/amap - Abandoned upstream, last release 10+ years ago
security/amavis-stats - Upstream is dead and last release was back in 2005
security/arirang - Abandoned (website also refers to Ruby 1.9) and a 9+ year
old webserver security scanner isn't useful today
security/axTLS - Very outdated and abandoned, current version in tree was
released in 2013 and last by upstream in 2019
security/base - Broken with PHP 7+, forked here
https://github.com/NathanGibbs3/BASE/
security/bruteforceblocker - Abandonware, please consider using
security/sshguard
security/cfs - Deprecated upstream, reference:
https://www.bayofrum.net/cgi-bin/fossil/cfs/index
security/cisco-torch - Unfetchable, dead upstream
security/cp2fwb - Used with deprecated software Firewall Builder
security/dcetest - Targets deprecated protocol by Microsoft in favour of .NET
security/doscan - Abandonware, last release in 2014. Please consider using
security/masscan or sysutils/pnscan
security/find-zlib - Deprecated, no longer relevant (Only the first 15 lines of the commit message are shown above ) |
0.4 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
0.4 10 Sep 2018 13:14:52 |
mat |
Add DOCS options to ports that should have one.
Also various fixes related to said option.
PR: 230864
Submitted by: mat
exp-runs by: antoine |
0.4 01 Nov 2017 13:10:35 |
olgeni |
Fix whitespace issues (mixed tab/spaces, alignment) in a few ports. |
0.4 19 May 2016 10:53:06 |
amdmi3 |
- Fix trailing whitespace in pkg-descrs, categories [p-x]*
Approved by: portmgr blanket |
0.4 01 Apr 2016 14:25:18 |
mat |
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.
With hat: portmgr
Sponsored by: Absolight |
0.4 14 Mar 2016 21:56:05 |
feld |
Cisco-torch is a mass Cisco Vulnerability Scanner.
The main feature that makes Cisco-torch different from similar
tools is the extensive use of forking to launch multiple scanning
processes on the background for maximum scanning efficiency. Also,
it uses several methods of application layer fingerprinting simultaneously,
if needed. We wanted something fast to discover remote Cisco hosts running
Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks
against the services discovered.
WWW: http://www.hackingciscoexposed.com/?link=tools
PR: 207221
Submitted by: Rihaz Jerrin <rihaz.jerrin@gmail.com> |
Number of commits found: 8
|