Penetration Testing mailing list archives
RE: Extracting credentials from pcap
From: "Shenk, Jerry A" <jshenk () decommunications com>
Date: Mon, 17 Sep 2007 08:10:14 -0400
Not sure how big a collection of pcaps you have but one way is to search the pcap files for the passwords that you find. There will be timestamps in the raw packet. If you have 20 or 30 different passwords, that can work but if you have hundreds and hundreds....well, that's getting to be a lot of work;) I've done the "20-30 method" but never had a need to automate it. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of David Sent: Sunday, September 16, 2007 8:00 AM To: Pen-Testing Subject: Extracting credentials from pcap I have a large number of pcaps from sensors around a network. I'd like to be able to extract details of authentications (e.g. HTTP, POP, IMAP) and credentials from these, with dates and times so I can draw up a report for a customer. Unfortunately they seem to have neglected to implement decent logging and now they are stuck. dsniff is fantastic at pulling out various credentials but it doesn't get the dates correct from pcap. When digging about the source code it seems that dsniff just prints the current time/date when it finds a new record. It doesn't even seem that libnids passes the pcap timestamp. So I'm looking for other ideas to extract credentials along with the date and time of their occurrence. This way I can hopefully have a decent log of what happened when and find out "whodunnit". Any ideas? David ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------ **DISCLAIMER This e-mail message and any files transmitted with it are intended for the use of the individual or entity to which they are addressed and may contain information that is privileged, proprietary and confidential. If you are not the intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the message. If you have received this communication in error, please notify the sender and delete this e-mail message. The contents do not represent the opinion of D&E except to the extent that it relates to their official business. ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------
Current thread:
- Extracting credentials from pcap David (Sep 16)
- RE: Extracting credentials from pcap Shenk, Jerry A (Sep 17)
- Re: Extracting credentials from pcap Brian Toovey (Sep 17)
- Re: Extracting credentials from pcap Brian Toovey (Sep 17)
- Re: Extracting credentials from pcap SD List (Sep 19)
- Re: Extracting credentials from pcap Brian Toovey (Sep 17)