Result for 06B909F367F79D167FF5585DE10978B0BA764735

Query result

Key Value
FileName./usr/lib/brutesharkcli/System.Windows.dll
FileSize16304
MD5D7659B478DF1CA334E7E574D4306C10B
SHA-106B909F367F79D167FF5585DE10978B0BA764735
SHA-256715072557C66C82DD3C6DFE3C6A06924B659F25BD53133124ECFEEA94F0D9FBF
SSDEEP192:kWEIFWSGaVt0xk2DW1R7KOTYRHnhWgN7aIJWwAlq21eX01k9z3Anx01F:kWEIFWjaVtik2IyHRN7cll8R9zKx07
TLSHT154724BA6A7A88307DDBB6D7082E5DA433D3D67C71A10926B1285F9951CA33C1DB3036E
hashlookup:parent-total2
hashlookup:trust60

Network graph view

Parents (Total: 2)

The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize26303992
MD5219C18567E248C574DA0CE721BE70301
PackageDescriptionNetwork Forensic Analysis Tool (NFAT) This package contains a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack. . The main goal of the project is to provide solution to security researchers and network administrators with the task of network traffic analysis while they try to identify weaknesses that can be used by a potential attacker to gain access to critical points on the network. . On Linux it is a Command Line Interface tool.
PackageMaintainerKali Developers <devel@kali.org>
PackageNamebruteshark
PackageSectioncontrib/utils
PackageVersion1.2.5-0kali1
SHA-13678464C9711BD44851AD5377F84913B1A09A290
SHA-2560592C9A4803328F753DEFE7AB7E8F05A4DC462C1503DD9BE538C6EBE382F8DC3
Key Value
FileSize26302864
MD5BA934181CC4C102C785171D048D601C3
PackageDescriptionNetwork Forensic Analysis Tool (NFAT) This package contains a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack. . The main goal of the project is to provide solution to security researchers and network administrators with the task of network traffic analysis while they try to identify weaknesses that can be used by a potential attacker to gain access to critical points on the network. . On Linux it is a Command Line Interface tool.
PackageMaintainerKali Developers <devel@kali.org>
PackageNamebruteshark
PackageSectioncontrib/utils
PackageVersion1.2.5-0kali2
SHA-190C92A9E0F0A6951604D6E1F657C5079EE916A60
SHA-25663B8C52183C58FC4091E3E9AECC8C6D7EFC35A980525680819D1A8757169AD31