Result for FB9DAA5EC62B7F77A5EDA63F4F0CFF6764B08D99

Query result

Key Value
FileName./usr/share/doc/packages/knockd/README.md
FileSize1690
MD594A304A245A8E0A12B0B11411D1E1D66
SHA-1FB9DAA5EC62B7F77A5EDA63F4F0CFF6764B08D99
SHA-256C7374078EDC9AC065D0C9564664A87D8A57FE26169BF3679F3158839D4C0A114
SSDEEP24:jECPFXKPLMEt9lMF+CdTcZW5W1rG32wrIULWGzr56D2zrLmJUZ50RUFixqbaKjXk:AEFhEtbMF+qIZWW1GPLWGzo6ZqRc3bXU
TLSHT16331941FB675B1F02257031045C3F2A3A322A3F933A6953CB83ECA8E3B15D46A2F9541
hashlookup:parent-total12
hashlookup:trust100

Network graph view

Parents (Total: 12)

The searched file hash is included in 12 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD56595D67847ED634D2FBE27D9E6D46F2B
PackageArchx86_64
PackageDescriptionknock is a server/client set that implements the idea known as port- knocking. Port-knocking is a method of accessing a backdoor to your firewall through a special sequence of port hits. This can be useful for opening up temporary holes in a restrictive firewall for SSH access or similar.
PackageMaintainerumeabot <umeabot>
PackageNameknock
PackageRelease2.mga9
PackageVersion0.8
SHA-11EE68010A3F5BCD3B7BCEFFF7CD85B0BEF0BF618
SHA-256099A2F51E7E6860D1DD9450D8065AC6FE08C323FD560E63CFD385B4AFE809BB4
Key Value
MD576C72997AAB3E142354AD01963E1CBDF
PackageArchx86_64
PackageDescriptionIt listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client (package knock) makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameknockd
PackageReleasebp154.1.30
PackageVersion0.8
SHA-157252172A866D3F0035FE4DD52FADBB9490FF162
SHA-256FC12395DE20E037C6A738D42981E866A7263C43739B378B12A4722421CCC5F1D
Key Value
MD5A647EF790E2E1CFBA0333A0481A09869
PackageArchs390x
PackageDescriptionIt listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client (package knock) makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameknockd
PackageReleasebp156.3.8
PackageVersion0.8
SHA-1BBFA7C589B701A5282A215AFBC0EF45BFA4A6DAC
SHA-25667D4D9B77819C6A91C5227EBE62D09C411F404729138D03C3BE0A4D84F693216
Key Value
MD5276C8350B6EBFFD2370EAB1BFACC8AE6
PackageArchs390x
PackageDescriptionIt listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client (package knock) makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameknockd
PackageReleasebp155.2.11
PackageVersion0.8
SHA-1ACAA16F808695154CCD7060D8E3DB4440149CE9D
SHA-256744325484B07A9F66100C2586F63CE45F5127F877375A96062782EC746473946
Key Value
MD52EA4C15794DF98DAFB65ED960B0F64DA
PackageArchs390x
PackageDescriptionIt listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client (package knock) makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameknockd
PackageReleasebp154.1.30
PackageVersion0.8
SHA-1C4460637152972B4E8E1746CC724D107ACC657B8
SHA-256986C25A14FFDF902AA4A34E9310490417C6F7081581D72D30063FECD52CF1023
Key Value
MD59A2BBBBCBB75B400FAD0BE544287ACD5
PackageArchx86_64
PackageDescriptionIt listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client (package knock) makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameknockd
PackageReleasebp156.3.8
PackageVersion0.8
SHA-1262302AD970625298BAB1CF7A6D4BC41D9189C8C
SHA-256BB101E329BBBAFA90CE9EAEAE9A060386179464F0A60438E17E74EA8BB538847
Key Value
MD5090C853B15FC41902EEFEF9D6660EF1D
PackageArchi586
PackageDescriptionIt listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client (package knock) makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameknockd
PackageRelease2.2
PackageVersion0.8
SHA-1603C14AD1DCD06E4E888053A93BA1F38723A50A4
SHA-256FE342F29C13DD1E4D6452805AC881CC009C4C979A2CF2499978BAC912D9B1D17
Key Value
MD53510021691F3CF1AB0265DE31773D529
PackageArchi586
PackageDescriptionknock is a server/client set that implements the idea known as port- knocking. Port-knocking is a method of accessing a backdoor to your firewall through a special sequence of port hits. This can be useful for opening up temporary holes in a restrictive firewall for SSH access or similar.
PackageMaintainerumeabot <umeabot>
PackageNameknock
PackageRelease2.mga9
PackageVersion0.8
SHA-14DFFC2788848BB6F7438F726A98E1BF383216B6D
SHA-25626A5F8014E12DE4AE5AF88382D76F0CF7348136F796BEAA6A6B3934AFFFB4F58
Key Value
MD5D78843F48CE22EDC7F75169E7369EEFA
PackageArchaarch64
PackageDescriptionknock is a server/client set that implements the idea known as port- knocking. Port-knocking is a method of accessing a backdoor to your firewall through a special sequence of port hits. This can be useful for opening up temporary holes in a restrictive firewall for SSH access or similar.
PackageMaintainerumeabot <umeabot>
PackageNameknock
PackageRelease2.mga9
PackageVersion0.8
SHA-1869A33AD608488B49E240FAA0BE7198E41667669
SHA-256385D3DFA74DD8C47B1F8DCB3C0102EDAAEE02FE2C0B302B5800F58327945A1FF
Key Value
MD5CDEA987770C765B3D2552FF77944E892
PackageArchx86_64
PackageDescriptionIt listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client (package knock) makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameknockd
PackageReleasebp155.2.11
PackageVersion0.8
SHA-13D15ECCDEAB5D7DDD20E9201E54F622156814741
SHA-256216866D1B6EA8ACA93B822372A2E015F35AF1B66F5AB116AB22423A82D2E6A45
Key Value
MD57D338F188F23CF28057D5DC67AE67A7A
PackageArcharmv7hl
PackageDescriptionknock is a server/client set that implements the idea known as port- knocking. Port-knocking is a method of accessing a backdoor to your firewall through a special sequence of port hits. This can be useful for opening up temporary holes in a restrictive firewall for SSH access or similar.
PackageMaintainerumeabot <umeabot>
PackageNameknock
PackageRelease2.mga9
PackageVersion0.8
SHA-1A8F2121D2C3CB1355E7C62B1EF1D8A5A025959A0
SHA-25696ABD534A98056AF9E1071EF358E13323D71E785702201F074C4F23E2DB9296B
Key Value
MD5F53671FC594FED03701C5F552EDA56F4
PackageArchx86_64
PackageDescriptionIt listens to all traffic on an ethernet (or PPP) interface, looking for special "knock" sequences of port-hits. A client (package knock) makes these port-hits by sending a TCP (or UDP) packet to a port on the server. This port need not be open -- since knockd listens at the link-layer level, it sees all traffic even if it's destined for a closed port. When the server detects a specific sequence of port-hits, it runs a command defined in its configuration file. This can be used to open up holes in a firewall for quick access.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameknockd
PackageRelease2.2
PackageVersion0.8
SHA-111ACF0DB2AE41227E68ED28005C0D6E7CEF64B3D
SHA-256B6D1A118D2EE24FA7BBEFB14DDB19E9E04B69934278CAEECF14297EACD4ED9E4