How to Install and Uninstall hunt.x86_64 Package on Fedora 34
Last updated: November 29,2024
1. Install "hunt.x86_64" package
This guide let you learn how to install hunt.x86_64 on Fedora 34
$
sudo dnf update
Copied
$
sudo dnf install
hunt.x86_64
Copied
2. Uninstall "hunt.x86_64" package
In this section, we are going to explain the necessary steps to uninstall hunt.x86_64 on Fedora 34:
$
sudo dnf remove
hunt.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the hunt.x86_64 package on Fedora 34
Last metadata expiration check: 1:17:42 ago on Tue Sep 6 08:10:37 2022.
Available Packages
Name : hunt
Version : 1.5
Release : 34.fc34
Architecture : x86_64
Size : 101 k
Source : hunt-1.5-34.fc34.src.rpm
Repository : fedora
Summary : Tool for demonstrating well known weaknesses in the TCP/IP protocol suite
URL : http://lin.fsid.cvut.cz/~kra/index.html
License : GPLv2
Description : Hunt is a program for intruding into a connection, watching it and
: resetting it. It was inpired by products like Juggernaut or T-sight
: but has several features which can not be found in these products.
:
: Note that hunt is operating on Ethernet and is best used for connections
: which can be watched through it. However, it is possible to do something
: even for hosts on another segments. The hunt doesn't distinguish between
: local network connections and connections going to/from Internet. It can
: handle all connections it sees.
:
: Connection hijacking is aimed primarily at the telnet traffic but it can
: be used for another traffic too. The reset, watching, arp... features
: are common to all connections.
Available Packages
Name : hunt
Version : 1.5
Release : 34.fc34
Architecture : x86_64
Size : 101 k
Source : hunt-1.5-34.fc34.src.rpm
Repository : fedora
Summary : Tool for demonstrating well known weaknesses in the TCP/IP protocol suite
URL : http://lin.fsid.cvut.cz/~kra/index.html
License : GPLv2
Description : Hunt is a program for intruding into a connection, watching it and
: resetting it. It was inpired by products like Juggernaut or T-sight
: but has several features which can not be found in these products.
:
: Note that hunt is operating on Ethernet and is best used for connections
: which can be watched through it. However, it is possible to do something
: even for hosts on another segments. The hunt doesn't distinguish between
: local network connections and connections going to/from Internet. It can
: handle all connections it sees.
:
: Connection hijacking is aimed primarily at the telnet traffic but it can
: be used for another traffic too. The reset, watching, arp... features
: are common to all connections.