net-creds 1.0

Sniffs sensitive data from interface or pcap

This resource is being watched by 58 members.
  1. Mr. Penguin
    Thoroughly sniff passwords and hashes from an interface or pcap file. Concatenates fragmented packets and does not rely on ports for service identification.

    • URLs visited
    • HTTP site logins/passwords
    • HTTP Basic Auth
    • FTP logins/passwords
    • IRC logins/passwords
    • POP logins/passwords
    • IMAP logins/passwords
    • SMTP logins/passwords
    • SNMP community string
    • NTLM challenge and response hashes
    • Kerberos (untested, I have no pcaps)

    Auto-detect the interface to sniff
    Select All
    sudo python
    Choose eth0 as the interface
    Select All
    sudo python -i eth0
    Read from pcap
    Select All
    sudo python -p pcapfile

    • Laurent Gaffie writer of PCredz
    • psychomario writer of ntlmsspparser
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.

    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K