The following packages will be installed: dnsmap Fetching README... 0%100%100%100%100%100%Done Fetching dnsmap.SlackBuild... 0%100%100%100%100%100%Done Fetching dnsmap.info... 0%100%100%100%100%100%Done Fetching slack-desc... 0%100%100%100%100%100%Done dnsmap-0.30/ dnsmap-0.30/wordlist_TLAs.txt dnsmap-0.30/use_cases.txt dnsmap-0.30/TODO.txt dnsmap-0.30/README.txt dnsmap-0.30/Makefile dnsmap-0.30/gpl-2.0.txt dnsmap-0.30/dnsmap-bulk.sh dnsmap-0.30/dnsmap.h dnsmap-0.30/dnsmap.c dnsmap-0.30/CREDITS.txt dnsmap-0.30/Changelog.txt gcc -I. -o dnsmap dnsmap.c mkdir -p /usr/src/slapt-src-x86_64/network/dnsmap/package-dnsmap/usr/bin install -m 0755 dnsmap /usr/src/slapt-src-x86_64/network/dnsmap/package-dnsmap/usr/bin install -m 0755 dnsmap-bulk.sh /usr/src/slapt-src-x86_64/network/dnsmap/package-dnsmap/usr/bin/dnsmap-bulk Slackware package maker, version 3.14159265. Searching for symbolic links: No symbolic links were found, so we won't make an installation script. You can make your own later in ./install/doinst.sh and rebuild the package if you like. This next step is optional - you can set the directories in your package to some sane permissions. If any of the directories in your package have special permissions, then DO NOT reset them here! Would you like to reset all directory permissions to 755 (drwxr-xr-x) and directory ownerships to root.root ([y]es, [n]o)? n Creating Slackware package: /usr/src/slapt-src-x86_64/network/dnsmap/dnsmap-0.30-x86_64-1salix15.0.txz ./ install/ install/slack-desc usr/ usr/bin/ usr/bin/dnsmap usr/bin/dnsmap-bulk usr/doc/ usr/doc/dnsmap-0.30/ usr/doc/dnsmap-0.30/CREDITS.txt usr/doc/dnsmap-0.30/Changelog.txt usr/doc/dnsmap-0.30/README.txt usr/doc/dnsmap-0.30/TODO.txt usr/doc/dnsmap-0.30/dnsmap.SlackBuild usr/doc/dnsmap-0.30/gpl-2.0.txt usr/doc/dnsmap-0.30/use_cases.txt usr/doc/dnsmap-0.30/wordlist_TLAs.txt Slackware package /usr/src/slapt-src-x86_64/network/dnsmap/dnsmap-0.30-x86_64-1salix15.0.txz created. Installing package dnsmap-0.30-x86_64-1salix15.0... | dnsmap (dns mapper) | | dnsmap is mainly meant to be used by pentesters during the | information gathering/enumeration phase of infrastructure | security assessments. | | | | | | | |