How to Install and Uninstall dsniff.x86_64 Package on Red Hat Enterprise Linux 9 (RHEL 9)
Last updated: November 25,2024
1. Install "dsniff.x86_64" package
This guide let you learn how to install dsniff.x86_64 on Red Hat Enterprise Linux 9 (RHEL 9)
$
sudo dnf update
Copied
$
sudo dnf install
dsniff.x86_64
Copied
2. Uninstall "dsniff.x86_64" package
This guide let you learn how to uninstall dsniff.x86_64 on Red Hat Enterprise Linux 9 (RHEL 9):
$
sudo dnf remove
dsniff.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the dsniff.x86_64 package on Red Hat Enterprise Linux 9 (RHEL 9)
Last metadata expiration check: 1:25:03 ago on Mon Feb 26 07:04:30 2024.
Available Packages
Name : dsniff
Version : 2.4
Release : 0.37.b1.el9
Architecture : x86_64
Size : 137 k
Source : dsniff-2.4-0.37.b1.el9.src.rpm
Repository : epel
Summary : Tools for network auditing and penetration testing
URL : https://www.monkey.org/~dugsong/dsniff/
License : BSD
Description : A collection of tools for network auditing and penetration testing. Dsniff,
: filesnarf, mailsnarf, msgsnarf, urlsnarf and webspy allow to passively monitor
: a network for interesting data (passwords, e-mail, files). Arpspoof, dnsspoof
: and macof facilitate the interception of network traffic normally unavailable
: to an attacker (e.g, due to layer-2 switching). Sshmitm and webmitm implement
: active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions
: by exploiting weak bindings in ad-hoc PKI.
Available Packages
Name : dsniff
Version : 2.4
Release : 0.37.b1.el9
Architecture : x86_64
Size : 137 k
Source : dsniff-2.4-0.37.b1.el9.src.rpm
Repository : epel
Summary : Tools for network auditing and penetration testing
URL : https://www.monkey.org/~dugsong/dsniff/
License : BSD
Description : A collection of tools for network auditing and penetration testing. Dsniff,
: filesnarf, mailsnarf, msgsnarf, urlsnarf and webspy allow to passively monitor
: a network for interesting data (passwords, e-mail, files). Arpspoof, dnsspoof
: and macof facilitate the interception of network traffic normally unavailable
: to an attacker (e.g, due to layer-2 switching). Sshmitm and webmitm implement
: active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions
: by exploiting weak bindings in ad-hoc PKI.