Penetration Testing mailing list archives

RES: PPPOE password sniffing


From: "Cleverson de Freitas Ferla" <ferla () aliasnet com br>
Date: Mon, 29 Jan 2007 16:16:19 -0300



-----Mensagem original-----
De: listbounce () securityfocus com [mailto:listbounce () securityfocus com] Em
nome de alexpheno () gmail com
Enviada em: sábado, 27 de janeiro de 2007 18:43
Para: pen-test () securityfocus com
Assunto: Re: PPPOE password sniffing

If you're using PAP as an authentication scheme you must look into the
packets that follow the PPPOE session, after you've found a PPPOE
access concentrator a PPP session is established. You must look for a
packet that is sent by the authenticating terminal (in this case your
computer)  to the concentrator. Try to do a wireshark capture and
apply this filter rule "pap and eth.src==XX:XX:XX:XX:XX:XX", and
replace the x part with the terminal's mac address. If a frame matches
the filter it should contain the user and password in the payload.

Check out RFC1334 for more info.
--
Alex Nedelcu
CCNA, SNRS, CSVPN

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.

http://www.cenzic.com/products_services/download_hailstorm.php?camp=70160000
0008bOW
------------------------------------------------------------------------

Attachment: smime.p7s
Description:


Current thread: