[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#433472: marked as done (ITP: dirbuster -- Directory & file brute forcing, with a twist)



Your message dated Wed, 16 Jul 2008 11:59:39 -0600
with message-id <E1KJBHv-0003D8-Op@merkel.debian.org>
and subject line WNPP bug closing
has caused the Debian Bug report #433472,
regarding ITP: dirbuster -- Directory & file brute forcing, with a twist
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
433472: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=433472
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Tim Brown <timb@nth-dimension.org.uk>

* Package name    : dirbuster
  Version         : 0.9.7
  Upstream Author : James Fisher <dirbuster@sittinglittleduck.com>
* URL             : http://sourceforge.net/projects/dirbuster/
* License         : LGPL
  Programming Lang: Java
  Description     : Directory & file brute forcing, with a twist

DirBuster is a multi threaded java application designed to brute force
directories and files names on web/application servers. Often is the case
now of what looks like a web server in a state of default installation is
actually not, and has pages and applications hidden within. DirBuster
attempts to find these

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.18 (SMP w/1 CPU core)
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash


--- End Message ---
--- Begin Message ---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:

 reopen 433472
 stop

Further comments on the work done in the bug sent to
433472@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza <damog@debian.org>.
 


--- End Message ---

Reply to: