head	1.1;
access;
symbols
	RELEASE_8_3_0:1.1
	RELEASE_9_0_0:1.1
	RELEASE_7_4_0:1.1
	RELEASE_8_2_0:1.1
	RELEASE_6_EOL:1.1
	RELEASE_8_1_0:1.1
	RELEASE_7_3_0:1.1
	RELEASE_8_0_0:1.1
	RELEASE_7_2_0:1.1
	RELEASE_7_1_0:1.1
	RELEASE_6_4_0:1.1
	RELEASE_5_EOL:1.1
	RELEASE_7_0_0:1.1
	RELEASE_6_3_0:1.1
	PRE_XORG_7:1.1
	RELEASE_4_EOL:1.1
	RELEASE_6_2_0:1.1
	RELEASE_6_1_0:1.1
	RELEASE_5_5_0:1.1
	RELEASE_6_0_0:1.1
	RELEASE_5_4_0:1.1
	RELEASE_4_11_0:1.1
	RELEASE_5_3_0:1.1
	RELEASE_4_10_0:1.1
	RELEASE_5_2_1:1.1
	RELEASE_5_2_0:1.1
	RELEASE_4_9_0:1.1;
locks; strict;
comment	@# @;


1.1
date	2003.09.04.13.57.33;	author edwin;	state Exp;
branches;
next	;


desc
@@


1.1
log
@new port: dump MSRPC information

	One-file-port, from @@stake. This dumps information from
	remote RPC.  Much like "rpcinfo -p host" on unix hosts.
	Please check my patches: I removed an unused function so
	this wouldn't be marked as a security sensitive port, and
	I'm not sure my Makefile change respects CFLAGS.

PR:		ports/46991
Submitted by:	Yonatan@@xpert.com <Yonatan@@xpert.com>
@
text
@This little utility dumps MSRPC endpoint information from Windows
systems. Similar to the rpcdump program from Microsoft, but does not
need a DCE stack and so runs on Unixes. dcetest can be very useful
once inside a DMZ to fingerprint Windows machines on the network.
dcetest operates over TCP port 135. (Think of it as rpcinfo -p against
Windows)

WWW: http://www.atstake.com/research/tools/info_gathering/
@
