How to Install and Uninstall tcpd Package on Kali Linux
Last updated: February 02,2025
1. Install "tcpd" package
In this section, we are going to explain the necessary steps to install tcpd on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
tcpd
Copied
2. Uninstall "tcpd" package
Here is a brief guide to show you how to uninstall tcpd on Kali Linux:
$
sudo apt remove
tcpd
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the tcpd package on Kali Linux
Package: tcpd
Source: tcp-wrappers (7.6.q-32)
Version: 7.6.q-32+b1
Installed-Size: 117
Maintainer: Marco d'Itri
Architecture: amd64
Depends: libc6 (>= 2.34), libwrap0 (= 7.6.q-32+b1)
Size: 23596
SHA256: 2c05e99975758311580327771f97273b0e34fe34e9e2d534306de7e17ab14fce
SHA1: d34ac6b09c675a774dbef131a67397364bd588cf
MD5sum: c02ce5d0a41f72b16bcc350e8caa1adc
Description: Wietse Venema's TCP wrapper utilities
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
Description-md5:
Multi-Arch: foreign
Tag: admin::logging, implemented-in::c, interface::daemon, network::firewall,
protocol::tcp, role::program, security::firewall
Section: net
Priority: optional
Filename: pool/main/t/tcp-wrappers/tcpd_7.6.q-32+b1_amd64.deb
Source: tcp-wrappers (7.6.q-32)
Version: 7.6.q-32+b1
Installed-Size: 117
Maintainer: Marco d'Itri
Architecture: amd64
Depends: libc6 (>= 2.34), libwrap0 (= 7.6.q-32+b1)
Size: 23596
SHA256: 2c05e99975758311580327771f97273b0e34fe34e9e2d534306de7e17ab14fce
SHA1: d34ac6b09c675a774dbef131a67397364bd588cf
MD5sum: c02ce5d0a41f72b16bcc350e8caa1adc
Description: Wietse Venema's TCP wrapper utilities
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
.
These programs log the client host name of incoming telnet,
ftp, rsh, rlogin, finger etc. requests.
.
Security options are:
- access control per host, domain and/or service;
- detection of host name spoofing or host address spoofing;
- booby traps to implement an early-warning system.
Description-md5:
Multi-Arch: foreign
Tag: admin::logging, implemented-in::c, interface::daemon, network::firewall,
protocol::tcp, role::program, security::firewall
Section: net
Priority: optional
Filename: pool/main/t/tcp-wrappers/tcpd_7.6.q-32+b1_amd64.deb