How to Install and Uninstall ohrwurm Package on Kali Linux
Last updated: November 07,2024
1. Install "ohrwurm" package
Please follow the step by step instructions below to install ohrwurm on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
ohrwurm
Copied
2. Uninstall "ohrwurm" package
Here is a brief guide to show you how to uninstall ohrwurm on Kali Linux:
$
sudo apt remove
ohrwurm
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the ohrwurm package on Kali Linux
Package: ohrwurm
Version: 0.1-1kali4
Architecture: amd64
Maintainer: Kali Developers
Installed-Size: 32
Depends: dsniff, libc6 (>= 2.34), libpcap0.8 (>= 0.9.8)
Homepage: http://mazzoo.de/blog/2006/08/25#ohrwurm
Priority: optional
Section: utils
Filename: pool/main/o/ohrwurm/ohrwurm_0.1-1kali4_amd64.deb
Size: 9640
SHA256: f8922780346a5f909b8108ab827b876c690decece2b712af7eb1b5e9263f5cb9
SHA1: 07238364e2eb4a439036e363a4e00c3431225d33
MD5sum: 61018bd390a495805c4c4276d729d559
Description: RTP fuzzer
ohrwurm is a small and simple RTP fuzzer that has been
successfully tested on a small number of SIP phones.
Features:
.
- reads SIP messages to get information of the RTP port
numbers
- reading SIP can be omitted by providing the RTP port
numbers, sothat any RTP traffic can be fuzzed
- RTCP traffic can be suppressed to avoid that codecs
- learn about the "noisy line"
- special care is taken to break RTP handling itself
- the RTP payload is fuzzed with a constant BER
- the BER is configurable
- requires arpspoof from dsniff to do the MITM attack
- requires both phones to be in a switched LAN (GW
operation only works partially)
Description-md5:
Version: 0.1-1kali4
Architecture: amd64
Maintainer: Kali Developers
Installed-Size: 32
Depends: dsniff, libc6 (>= 2.34), libpcap0.8 (>= 0.9.8)
Homepage: http://mazzoo.de/blog/2006/08/25#ohrwurm
Priority: optional
Section: utils
Filename: pool/main/o/ohrwurm/ohrwurm_0.1-1kali4_amd64.deb
Size: 9640
SHA256: f8922780346a5f909b8108ab827b876c690decece2b712af7eb1b5e9263f5cb9
SHA1: 07238364e2eb4a439036e363a4e00c3431225d33
MD5sum: 61018bd390a495805c4c4276d729d559
Description: RTP fuzzer
ohrwurm is a small and simple RTP fuzzer that has been
successfully tested on a small number of SIP phones.
Features:
.
- reads SIP messages to get information of the RTP port
numbers
- reading SIP can be omitted by providing the RTP port
numbers, sothat any RTP traffic can be fuzzed
- RTCP traffic can be suppressed to avoid that codecs
- learn about the "noisy line"
- special care is taken to break RTP handling itself
- the RTP payload is fuzzed with a constant BER
- the BER is configurable
- requires arpspoof from dsniff to do the MITM attack
- requires both phones to be in a switched LAN (GW
operation only works partially)
Description-md5: