How to Install and Uninstall hcxtools.x86_64 Package on Red Hat Enterprise Linux 9 (RHEL 9)

Last updated: June 16,2024

1. Install "hcxtools.x86_64" package

Please follow the guidelines below to install hcxtools.x86_64 on Red Hat Enterprise Linux 9 (RHEL 9)

$ sudo dnf update $ sudo dnf install hcxtools.x86_64

2. Uninstall "hcxtools.x86_64" package

Please follow the guidance below to uninstall hcxtools.x86_64 on Red Hat Enterprise Linux 9 (RHEL 9):

$ sudo dnf remove hcxtools.x86_64 $ sudo dnf autoremove

3. Information about the hcxtools.x86_64 package on Red Hat Enterprise Linux 9 (RHEL 9)

Last metadata expiration check: 1:52:16 ago on Mon Feb 26 07:04:30 2024.
Available Packages
Name : hcxtools
Version : 6.3.2
Release : 1.el9
Architecture : x86_64
Size : 182 k
Source : hcxtools-6.3.2-1.el9.src.rpm
Repository : epel
Summary : Portable solution for conversion WiFi dump files to hashcat formats
URL : https://github.com/ZerBea/hcxtools
License : MIT
Description : Small set of tools convert packets from captures (h = hash, c = capture,
: convert and calculate candidates, x = different hashtypes) for the use with
: latest hashcat or John the Ripper. The tools are 100% compatible to hashcat
: and John the Ripper and recommended by hashcat. This branch is pretty closely
: synced to hashcat git and John the Ripper git.
:
: Support of hashcat hash-modes: 4800, 5500, 2200x, 16100, 250x (deprecated),
: 1680x (deprecated)
:
: Support of John the Ripper hash-modes: WPAPSK-PMK, PBKDF2-HMAC-SHA1, chap,
: netntlm, tacacs-plus
:
: Support of gzip (.gz) single file compression.
:
: Main purpose is to detect weak points within own WiFi networks by analyzing
: the hashes. Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash
: file and check if wlan-key or plainmasterkey was transmitted unencrypted. Or
: upload the "uncleaned" dump file (pcapng, pcap, cap) here
: https://wpa-sec.stanev.org/?submit to find out if your ap or the client is
: vulnerable by using common wordlists or a weak password generation algorithm.