net-creds - Sniff Sensitive Data From Interface or pcap
![net-creds - Sniff Sensitive Data From Interface or pcap | hack4.net](https://d21ic6tdqjqnyw.cloudfront.net/wp-content/uploads/2015/03/08104116/netsniff2.jpg)
Thoroughly sniff passwords and hashes from an interface or pcap file. Concatenates fragmented packets and does not rely on ports for service identification.
![Sniff Sensitive Data netsniff Sniff Sensitive Data](http://d21ic6tdqjqnyw.cloudfront.net/wp-content/uploads/2015/03/08104125/netsniff.png)
Sniffs
- URLs visited
- POST loads sent
- HTTP form logins/passwords
- HTTP basic auth logins/passwords
- HTTP searches
- FTP logins/passwords
- IRC logins/passwords
- POP logins/passwords
- IMAP logins/passwords
- Telnet logins/passwords
- SMTP logins/passwords
- SNMP community string
- NTLMv1/v2 all supported protocols: HTTP, SMB, LDAP, etc.
- Kerberos
Examples
Auto-detect the interface to sniffsudo python net-creds.pyChoose eth0 as the interface
sudo python net-creds.py -i eth0Ignore packets to and from 192.168.0.2
sudo python net-creds.py -f 192.168.0.2Read from pcap
python net-creds.py -p pcapfile
Post a Comment