How to Install and Uninstall patator Package on Ubuntu 21.10 (Impish Indri)
Last updated: November 26,2024
1. Install "patator" package
This guide let you learn how to install patator on Ubuntu 21.10 (Impish Indri)
$
sudo apt update
Copied
$
sudo apt install
patator
Copied
2. Uninstall "patator" package
Please follow the steps below to uninstall patator on Ubuntu 21.10 (Impish Indri):
$
sudo apt remove
patator
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the patator package on Ubuntu 21.10 (Impish Indri)
Package: patator
Architecture: all
Version: 0.9-3build1
Priority: extra
Section: universe/utils
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 184
Depends: default-jre, ldap-utils, python3-psycopg2, unzip, python3-ajpy, python3-dnspython, python3-impacket, python3-ipy, python3-mysqldb, python3-openssl, python3-paramiko, python3-pyasn1, python3-pycryptodome, python3-pycurl, python3-pysnmp4, python3:any
Recommends: freerdp2-x11, ike-scan
Filename: pool/universe/p/patator/patator_0.9-3build1_all.deb
Size: 44784
MD5sum: 16fe9a7208f333d6431ec3745e492ffb
SHA1: 48cdba33f65e942f8d229478e4fe291858f06c31
SHA256: 6146eb59105fcd319bdf5ec2af8e731b5ecfc8f375a106bedf8bcd325e316296
SHA512: c14714bda926759b58449d7720761e1021781a96e609e6543f2a577721786cc6ab1e57d740711419be52b12c3626e35eb44cfdf2dcc22879c7a4c80759752b74
Homepage: https://github.com/lanjelot/patator
Description-en: Multi-purpose brute-forcer
Patator is a multi-purpose brute-forcer, with a modular
design and a flexible usage.
.
Currently it supports the following modules:
+ ftp_login : Brute-force FTP
+ ssh_login : Brute-force SSH
+ telnet_login : Brute-force Telnet
+ smtp_login : Brute-force SMTP
+ smtp_vrfy : Enumerate valid users using SMTP VRFY
+ smtp_rcpt : Enumerate valid users using SMTP RCPT TO
+ finger_lookup : Enumerate valid users using Finger
+ http_fuzz : Brute-force HTTP
+ ajp_fuzz : Brute-force AJP
+ pop_login : Brute-force POP3
+ pop_passd : Brute-force poppassd (http://netwinsite.com/poppassd/)
+ imap_login : Brute-force IMAP4
+ ldap_login : Brute-force LDAP
+ dcom_login : Brute-force DCOM
+ smb_login : Brute-force SMB
+ smb_lookupsid : Brute-force SMB SID-lookup
+ rlogin_login : Brute-force rlogin
+ vmauthd_login : Brute-force VMware Authentication Daemon
+ mssql_login : Brute-force MSSQL
+ mysql_login : Brute-force MySQL
+ mysql_query : Brute-force MySQL queries
+ rdp_login : Brute-force RDP (NLA)
+ pgsql_login : Brute-force PostgreSQL
+ vnc_login : Brute-force VNC
+ dns_forward : Forward DNS lookup
+ dns_reverse : Reverse DNS lookup
+ snmp_login : Brute-force SNMP v1/2/3
+ ike_enum : Enumerate IKE transforms
+ unzip_pass : Brute-force the password of encrypted ZIP files
+ keystore_pass : Brute-force the password of Java keystore files
+ umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes
+ tcp_fuzz : Fuzz TCP services
+ dummy_test : Testing module
Description-md5: 97354ff05618ad50dc8a7306e1f6fe3d
Architecture: all
Version: 0.9-3build1
Priority: extra
Section: universe/utils
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 184
Depends: default-jre, ldap-utils, python3-psycopg2, unzip, python3-ajpy, python3-dnspython, python3-impacket, python3-ipy, python3-mysqldb, python3-openssl, python3-paramiko, python3-pyasn1, python3-pycryptodome, python3-pycurl, python3-pysnmp4, python3:any
Recommends: freerdp2-x11, ike-scan
Filename: pool/universe/p/patator/patator_0.9-3build1_all.deb
Size: 44784
MD5sum: 16fe9a7208f333d6431ec3745e492ffb
SHA1: 48cdba33f65e942f8d229478e4fe291858f06c31
SHA256: 6146eb59105fcd319bdf5ec2af8e731b5ecfc8f375a106bedf8bcd325e316296
SHA512: c14714bda926759b58449d7720761e1021781a96e609e6543f2a577721786cc6ab1e57d740711419be52b12c3626e35eb44cfdf2dcc22879c7a4c80759752b74
Homepage: https://github.com/lanjelot/patator
Description-en: Multi-purpose brute-forcer
Patator is a multi-purpose brute-forcer, with a modular
design and a flexible usage.
.
Currently it supports the following modules:
+ ftp_login : Brute-force FTP
+ ssh_login : Brute-force SSH
+ telnet_login : Brute-force Telnet
+ smtp_login : Brute-force SMTP
+ smtp_vrfy : Enumerate valid users using SMTP VRFY
+ smtp_rcpt : Enumerate valid users using SMTP RCPT TO
+ finger_lookup : Enumerate valid users using Finger
+ http_fuzz : Brute-force HTTP
+ ajp_fuzz : Brute-force AJP
+ pop_login : Brute-force POP3
+ pop_passd : Brute-force poppassd (http://netwinsite.com/poppassd/)
+ imap_login : Brute-force IMAP4
+ ldap_login : Brute-force LDAP
+ dcom_login : Brute-force DCOM
+ smb_login : Brute-force SMB
+ smb_lookupsid : Brute-force SMB SID-lookup
+ rlogin_login : Brute-force rlogin
+ vmauthd_login : Brute-force VMware Authentication Daemon
+ mssql_login : Brute-force MSSQL
+ mysql_login : Brute-force MySQL
+ mysql_query : Brute-force MySQL queries
+ rdp_login : Brute-force RDP (NLA)
+ pgsql_login : Brute-force PostgreSQL
+ vnc_login : Brute-force VNC
+ dns_forward : Forward DNS lookup
+ dns_reverse : Reverse DNS lookup
+ snmp_login : Brute-force SNMP v1/2/3
+ ike_enum : Enumerate IKE transforms
+ unzip_pass : Brute-force the password of encrypted ZIP files
+ keystore_pass : Brute-force the password of Java keystore files
+ umbraco_crack : Crack Umbraco HMAC-SHA1 password hashes
+ tcp_fuzz : Fuzz TCP services
+ dummy_test : Testing module
Description-md5: 97354ff05618ad50dc8a7306e1f6fe3d