How to Install and Uninstall certspotter Package on Kali Linux
Last updated: November 07,2024
1. Install "certspotter" package
Please follow the instructions below to install certspotter on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
certspotter
Copied
2. Uninstall "certspotter" package
This tutorial shows how to uninstall certspotter on Kali Linux:
$
sudo apt remove
certspotter
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the certspotter package on Kali Linux
Package: certspotter
Version: 0.18.0-1
Installed-Size: 5382
Maintainer: Debian Go Packaging Team
Architecture: amd64
Depends: libc6 (>= 2.34), systemd | systemd-standalone-sysusers | systemd-sysusers, ca-certificates
Size: 1875156
SHA256: bd1dd4864db545947c161ae3d37fad746a5e872447fef4f8a5f3422ac2d6e4f2
SHA1: 2c62d20caf311bf99edcad9d9792a85e25104738
MD5sum: aa88bfff55b5f5acfd7f766a11b727f4
Description: Certificate Transparency Log Monitor
Cert Spotter is a Certificate Transparency log monitor from SSLMate that
alerts you when a SSL/TLS certificate is issued for one of your domains.
Cert Spotter is easier than other open source CT monitors, since it does
not require a database. It's also more robust, since it uses a special
certificate parser that ensures it won't miss certificates.
.
Cert Spotter is also available as a hosted service by SSLMate,
.
You can use Cert Spotter to detect:
* Certificates issued to attackers who have compromised your DNS and
are redirecting your visitors to their malicious site.
* Certificates issued to attackers who have taken over an abandoned
sub-domain in order to serve malware under your name.
* Certificates issued to attackers who have compromised a certificate
authority and want to impersonate your site.
* Certificates issued in violation of your corporate policy
or outside of your centralized certificate procurement process.
Description-md5:
Homepage: https://github.com/SSLMate/certspotter
Static-Built-Using: golang-1.21 (= 1.21.4-1), golang-golang-x-net (= 1:0.17.0+dfsg-1), golang-golang-x-sync (= 0.4.0-1), golang-golang-x-text (= 0.13.0-1)
Section: devel
Priority: optional
Filename: pool/main/c/certspotter/certspotter_0.18.0-1_amd64.deb
Version: 0.18.0-1
Installed-Size: 5382
Maintainer: Debian Go Packaging Team
Architecture: amd64
Depends: libc6 (>= 2.34), systemd | systemd-standalone-sysusers | systemd-sysusers, ca-certificates
Size: 1875156
SHA256: bd1dd4864db545947c161ae3d37fad746a5e872447fef4f8a5f3422ac2d6e4f2
SHA1: 2c62d20caf311bf99edcad9d9792a85e25104738
MD5sum: aa88bfff55b5f5acfd7f766a11b727f4
Description: Certificate Transparency Log Monitor
Cert Spotter is a Certificate Transparency log monitor from SSLMate that
alerts you when a SSL/TLS certificate is issued for one of your domains.
Cert Spotter is easier than other open source CT monitors, since it does
not require a database. It's also more robust, since it uses a special
certificate parser that ensures it won't miss certificates.
.
Cert Spotter is also available as a hosted service by SSLMate,
.
You can use Cert Spotter to detect:
* Certificates issued to attackers who have compromised your DNS and
are redirecting your visitors to their malicious site.
* Certificates issued to attackers who have taken over an abandoned
sub-domain in order to serve malware under your name.
* Certificates issued to attackers who have compromised a certificate
authority and want to impersonate your site.
* Certificates issued in violation of your corporate policy
or outside of your centralized certificate procurement process.
Description-md5:
Homepage: https://github.com/SSLMate/certspotter
Static-Built-Using: golang-1.21 (= 1.21.4-1), golang-golang-x-net (= 1:0.17.0+dfsg-1), golang-golang-x-sync (= 0.4.0-1), golang-golang-x-text (= 0.13.0-1)
Section: devel
Priority: optional
Filename: pool/main/c/certspotter/certspotter_0.18.0-1_amd64.deb