Penetration Testing mailing list archives

RE: Extracting credentials from pcap


From: "Shenk, Jerry A" <jshenk () decommunications com>
Date: Mon, 17 Sep 2007 08:10:14 -0400

Not sure how big a collection of pcaps you have but one way is to search
the pcap files for the passwords that you find.  There will be
timestamps in the raw packet.  If you have 20 or 30 different passwords,
that can work but if you have hundreds and hundreds....well, that's
getting to be a lot of work;)  I've done the "20-30 method" but never
had a need to automate it.

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of David
Sent: Sunday, September 16, 2007 8:00 AM
To: Pen-Testing
Subject: Extracting credentials from pcap

I have a large number of pcaps from sensors around a network.  I'd like 
to be able to extract details of authentications (e.g. HTTP, POP, IMAP) 
and credentials from these, with dates and times so I can draw up a 
report for a customer.  Unfortunately they seem to have neglected to 
implement decent logging and now they are stuck.

dsniff is fantastic at pulling out various credentials but it doesn't 
get the dates correct from pcap.  When digging about the source code it 
seems that dsniff just prints the current time/date when it finds a new 
record.  It doesn't even seem that libnids passes the pcap timestamp.

So I'm looking for other ideas to extract credentials along with the 
date and time of their occurrence.  This way I can hopefully have a 
decent log of what happened when and find out "whodunnit".

Any ideas?

David

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



**DISCLAIMER
This e-mail message and any files transmitted with it are intended for the use of the individual or entity to which 
they are addressed and may contain information that is privileged, proprietary and confidential. If you are not the 
intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the 
message. If you have received this communication in error, please notify the sender and delete this e-mail message. The 
contents do not represent the opinion of D&E except to the extent that it relates to their official business.


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: