How to Install and Uninstall hcxtools.x86_64 Package on CentOS Stream 9
Last updated: November 26,2024
1. Install "hcxtools.x86_64" package
This guide covers the steps necessary to install hcxtools.x86_64 on CentOS Stream 9
$
sudo dnf update
Copied
$
sudo dnf install
hcxtools.x86_64
Copied
2. Uninstall "hcxtools.x86_64" package
Please follow the step by step instructions below to uninstall hcxtools.x86_64 on CentOS Stream 9:
$
sudo dnf remove
hcxtools.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the hcxtools.x86_64 package on CentOS Stream 9
Last metadata expiration check: 2:55:06 ago on Sat Mar 16 16:03:45 2024.
Available Packages
Name : hcxtools
Version : 6.3.4
Release : 1.el9
Architecture : x86_64
Size : 185 k
Source : hcxtools-6.3.4-1.el9.src.rpm
Repository : epel
Summary : Portable solution for conversion WiFi dump files to hashcat formats
URL : https://github.com/ZerBea/hcxtools
License : MIT
Description : Small set of tools convert packets from captures (h = hash, c = capture,
: convert and calculate candidates, x = different hashtypes) for the use with
: latest hashcat or John the Ripper. The tools are 100% compatible to hashcat
: and John the Ripper and recommended by hashcat. This branch is pretty closely
: synced to hashcat git and John the Ripper git.
:
: Support of hashcat hash-modes: 4800, 5500, 2200x, 16100, 250x (deprecated),
: 1680x (deprecated)
:
: Support of John the Ripper hash-modes: WPAPSK-PMK, PBKDF2-HMAC-SHA1, chap,
: netntlm, tacacs-plus
:
: Support of gzip (.gz) single file compression.
:
: Main purpose is to detect weak points within own WiFi networks by analyzing
: the hashes. Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash
: file and check if wlan-key or plainmasterkey was transmitted unencrypted. Or
: upload the "uncleaned" dump file (pcapng, pcap, cap) here
: https://wpa-sec.stanev.org/?submit to find out if your ap or the client is
: vulnerable by using common wordlists or a weak password generation algorithm.
Available Packages
Name : hcxtools
Version : 6.3.4
Release : 1.el9
Architecture : x86_64
Size : 185 k
Source : hcxtools-6.3.4-1.el9.src.rpm
Repository : epel
Summary : Portable solution for conversion WiFi dump files to hashcat formats
URL : https://github.com/ZerBea/hcxtools
License : MIT
Description : Small set of tools convert packets from captures (h = hash, c = capture,
: convert and calculate candidates, x = different hashtypes) for the use with
: latest hashcat or John the Ripper. The tools are 100% compatible to hashcat
: and John the Ripper and recommended by hashcat. This branch is pretty closely
: synced to hashcat git and John the Ripper git.
:
: Support of hashcat hash-modes: 4800, 5500, 2200x, 16100, 250x (deprecated),
: 1680x (deprecated)
:
: Support of John the Ripper hash-modes: WPAPSK-PMK, PBKDF2-HMAC-SHA1, chap,
: netntlm, tacacs-plus
:
: Support of gzip (.gz) single file compression.
:
: Main purpose is to detect weak points within own WiFi networks by analyzing
: the hashes. Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash
: file and check if wlan-key or plainmasterkey was transmitted unencrypted. Or
: upload the "uncleaned" dump file (pcapng, pcap, cap) here
: https://wpa-sec.stanev.org/?submit to find out if your ap or the client is
: vulnerable by using common wordlists or a weak password generation algorithm.