net-creds 1.0

Sniffs sensitive data from interface or pcap

Watchers:
This resource is being watched by 50 members.
  1. Mr. Penguin
    Thoroughly sniff passwords and hashes from an interface or pcap file. Concatenates fragmented packets and does not rely on ports for service identification.
    Sniffs

    • URLs visited
    • HTTP site logins/passwords
    • HTTP Basic Auth
    • FTP logins/passwords
    • IRC logins/passwords
    • POP logins/passwords
    • IMAP logins/passwords
    • SMTP logins/passwords
    • SNMP community string
    • NTLM challenge and response hashes
    • Kerberos (untested, I have no pcaps)
    Examples

    Auto-detect the interface to sniff
    Code:
    Select All
    sudo python net-creds.py
    Choose eth0 as the interface
    Code:
    Select All
    sudo python net-creds.py -i eth0
    Read from pcap
    Code:
    Select All
    sudo python net-creds.py -p pcapfile
    Thanks

    • Laurent Gaffie writer of PCredz
    • psychomario writer of ntlmsspparser
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K