Result for 031A2C3BA6D787738A468F851D15251274277BCC

Query result

Key Value
FileName./usr/lib/brutesharkcli/System.Private.DataContractSerialization.dll
FileSize2085776
MD5AEE5C4D72D1F2D843FC5377C7A9AAFED
SHA-1031A2C3BA6D787738A468F851D15251274277BCC
SHA-256E2E15AAFBF6761272B3DE9BF3B6ECF5E8CF1CC6F3F55BCB4E1AFB68E3DD39B8F
SSDEEP49152:/M6Qb/dAe+OmlOLh2aL9TfXyG0qptTG6rXtdyZJ49S:k/GLAS
TLSHT158A58D1867E4431AD29F8639817585298EE8B01B2735DFC79901F4E42887BF3AFF6097
hashlookup:parent-total2
hashlookup:trust60

Network graph view

Parents (Total: 2)

The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize26303992
MD5219C18567E248C574DA0CE721BE70301
PackageDescriptionNetwork Forensic Analysis Tool (NFAT) This package contains a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack. . The main goal of the project is to provide solution to security researchers and network administrators with the task of network traffic analysis while they try to identify weaknesses that can be used by a potential attacker to gain access to critical points on the network. . On Linux it is a Command Line Interface tool.
PackageMaintainerKali Developers <devel@kali.org>
PackageNamebruteshark
PackageSectioncontrib/utils
PackageVersion1.2.5-0kali1
SHA-13678464C9711BD44851AD5377F84913B1A09A290
SHA-2560592C9A4803328F753DEFE7AB7E8F05A4DC462C1503DD9BE538C6EBE382F8DC3
Key Value
FileSize26302864
MD5BA934181CC4C102C785171D048D601C3
PackageDescriptionNetwork Forensic Analysis Tool (NFAT) This package contains a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack. . The main goal of the project is to provide solution to security researchers and network administrators with the task of network traffic analysis while they try to identify weaknesses that can be used by a potential attacker to gain access to critical points on the network. . On Linux it is a Command Line Interface tool.
PackageMaintainerKali Developers <devel@kali.org>
PackageNamebruteshark
PackageSectioncontrib/utils
PackageVersion1.2.5-0kali2
SHA-190C92A9E0F0A6951604D6E1F657C5079EE916A60
SHA-25663B8C52183C58FC4091E3E9AECC8C6D7EFC35A980525680819D1A8757169AD31