How to Install and Uninstall crackle Package on Kali Linux
Last updated: December 28,2024
1. Install "crackle" package
This is a short guide on how to install crackle on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
crackle
Copied
2. Uninstall "crackle" package
This guide covers the steps necessary to uninstall crackle on Kali Linux:
$
sudo apt remove
crackle
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the crackle package on Kali Linux
Package: crackle
Version: 0.1~git01282014-0kali3
Architecture: amd64
Maintainer: Kali Developers
Installed-Size: 54
Depends: libc6 (>= 2.34), libpcap0.8 (>= 0.9.8)
Homepage: https://github.com/mikeryan/crackle
Priority: optional
Section: utils
Filename: pool/main/c/crackle/crackle_0.1~git01282014-0kali3_amd64.deb
Size: 16140
SHA256: 039f692c459e753dad39d16681321971f718ac9f03aaaf0ef2a64c0c6a591410
SHA1: 731f584b68c15ab4845d8b2f8dc72e50021638e5
MD5sum: 31b9329a24497250490f21dd947581e5
Description: Crack and decrypt BLE encryption
crackle exploits a flaw in the BLE pairing process that allows an attacker to
guess or very quickly brute force the TK (Temporary Key). With the TK and other
data collected from the pairing process, the STK (Short Term Key) and later the
LTK (Long Term Key) can be collected.
.
With the STK and LTK, all communications between the master and the slave can
be decrypted
Description-md5:
Version: 0.1~git01282014-0kali3
Architecture: amd64
Maintainer: Kali Developers
Installed-Size: 54
Depends: libc6 (>= 2.34), libpcap0.8 (>= 0.9.8)
Homepage: https://github.com/mikeryan/crackle
Priority: optional
Section: utils
Filename: pool/main/c/crackle/crackle_0.1~git01282014-0kali3_amd64.deb
Size: 16140
SHA256: 039f692c459e753dad39d16681321971f718ac9f03aaaf0ef2a64c0c6a591410
SHA1: 731f584b68c15ab4845d8b2f8dc72e50021638e5
MD5sum: 31b9329a24497250490f21dd947581e5
Description: Crack and decrypt BLE encryption
crackle exploits a flaw in the BLE pairing process that allows an attacker to
guess or very quickly brute force the TK (Temporary Key). With the TK and other
data collected from the pairing process, the STK (Short Term Key) and later the
LTK (Long Term Key) can be collected.
.
With the STK and LTK, all communications between the master and the slave can
be decrypted
Description-md5: