Thoroughly sniff passwords and hashes from an interface or pcap file. Concatenates fragmented packets and does not rely on ports for service identification.
Sniffs
- URLs visited
- POST loads sent
- HTTP form logins/passwords
- HTTP basic auth logins/passwords
- HTTP searches
- FTP logins/passwords
- IRC logins/passwords
- POP logins/passwords
- IMAP logins/passwords
- Telnet logins/passwords
- SMTP logins/passwords
- SNMP community string
- NTLMv1/v2 all supported protocols like HTTP, SMB, LDAP, etc
- Kerberos
Examples
Auto-detect the interface to sniff
sudo python net-creds.py
Choose eth0 as the interfacesudo python net-creds.py -i eth0
Ignore packets to and from 192.168.0.2sudo python net-creds.py -f 192.168.0.2
Read from pcappython net-creds.py -p pcapfile