How to Install and Uninstall ncrack.x86_64 Package on Red Hat Enterprise Linux 8 (RHEL 8)
Last updated: December 01,2024
1. Install "ncrack.x86_64" package
Here is a brief guide to show you how to install ncrack.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8)
$
sudo dnf update
Copied
$
sudo dnf install
ncrack.x86_64
Copied
2. Uninstall "ncrack.x86_64" package
Please follow the steps below to uninstall ncrack.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8):
$
sudo dnf remove
ncrack.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the ncrack.x86_64 package on Red Hat Enterprise Linux 8 (RHEL 8)
Last metadata expiration check: 0:33:20 ago on Mon Feb 26 15:59:38 2024.
Available Packages
Name : ncrack
Version : 0.7
Release : 8.el8
Architecture : x86_64
Size : 684 k
Source : ncrack-0.7-8.el8.src.rpm
Repository : epel
Summary : A high-speed network auth cracking tool
URL : http://nmap.org/ncrack/
License : GPLv2 with exceptions
Description : Ncrack is a high-speed network authentication cracking tool. It was
: built to help companies secure their networks by proactively testing
: all their hosts and networking devices for poor passwords. Security
: professionals also rely on Ncrack when auditing their clients. Ncrack
: was designed using a modular approach, a command-line syntax similar to
: Nmap and a dynamic engine that can adapt its behaviour based on network
: feedback. It allows for rapid, yet reliable large-scale auditing of
: multiple hosts.
Available Packages
Name : ncrack
Version : 0.7
Release : 8.el8
Architecture : x86_64
Size : 684 k
Source : ncrack-0.7-8.el8.src.rpm
Repository : epel
Summary : A high-speed network auth cracking tool
URL : http://nmap.org/ncrack/
License : GPLv2 with exceptions
Description : Ncrack is a high-speed network authentication cracking tool. It was
: built to help companies secure their networks by proactively testing
: all their hosts and networking devices for poor passwords. Security
: professionals also rely on Ncrack when auditing their clients. Ncrack
: was designed using a modular approach, a command-line syntax similar to
: Nmap and a dynamic engine that can adapt its behaviour based on network
: feedback. It allows for rapid, yet reliable large-scale auditing of
: multiple hosts.