How to Install and Uninstall yersinia.x86_64 Package on Rocky Linux 8
Last updated: November 28,2024
1. Install "yersinia.x86_64" package
Please follow the guidance below to install yersinia.x86_64 on Rocky Linux 8
$
sudo dnf update
Copied
$
sudo dnf install
yersinia.x86_64
Copied
2. Uninstall "yersinia.x86_64" package
Learn how to uninstall yersinia.x86_64 on Rocky Linux 8:
$
sudo dnf remove
yersinia.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the yersinia.x86_64 package on Rocky Linux 8
Last metadata expiration check: 1:56:54 ago on Mon Sep 12 10:27:18 2022.
Available Packages
Name : yersinia
Version : 0.8.2
Release : 8.el8
Architecture : x86_64
Size : 177 k
Source : yersinia-0.8.2-8.el8.src.rpm
Repository : epel
Summary : Network protocols tester and attacker
URL : http://www.yersinia.net/
License : GPLv2+
Description : Yersinia is a network tool designed to take advantage of some weakeness
: in different network protocols. It pretends to be a solid framework for
: analyzing and testing the deployed networks and systems.
:
: Currently, there are some network protocols implemented, but others are
: coming (tell us which one is your preferred). Attacks for the following
: network protocols are implemented (but of course you are free for
: implementing new ones):
:
: * Spanning Tree Protocol (STP)
: * Cisco Discovery Protocol (CDP)
: * Dynamic Trunking Protocol (DTP)
: * Dynamic Host Configuration Protocol (DHCP)
: * Hot Standby Router Protocol (HSRP)
: * IEEE 802.1Q and IEEE 802.1X
: * Inter-Switch Link Protocol (ISL)
: * VLAN Trunking Protocol (VTP)
Available Packages
Name : yersinia
Version : 0.8.2
Release : 8.el8
Architecture : x86_64
Size : 177 k
Source : yersinia-0.8.2-8.el8.src.rpm
Repository : epel
Summary : Network protocols tester and attacker
URL : http://www.yersinia.net/
License : GPLv2+
Description : Yersinia is a network tool designed to take advantage of some weakeness
: in different network protocols. It pretends to be a solid framework for
: analyzing and testing the deployed networks and systems.
:
: Currently, there are some network protocols implemented, but others are
: coming (tell us which one is your preferred). Attacks for the following
: network protocols are implemented (but of course you are free for
: implementing new ones):
:
: * Spanning Tree Protocol (STP)
: * Cisco Discovery Protocol (CDP)
: * Dynamic Trunking Protocol (DTP)
: * Dynamic Host Configuration Protocol (DHCP)
: * Hot Standby Router Protocol (HSRP)
: * IEEE 802.1Q and IEEE 802.1X
: * Inter-Switch Link Protocol (ISL)
: * VLAN Trunking Protocol (VTP)