Re: extracting passwords from ethereal dump

From: Nicolas Gregoire (ngregoire@exaprobe.com)
Date: Tue Jun 21 2005 - 10:32:27 EDT


Le lundi 20 juin 2005 à 19:14 +0300, Mohamed Abdel Kader a écrit :

> I was on a assessment and decided to get some of the traffic moving
> along the network. i got it using ethereal. now i want a program
> (other than ettercap) that can take this dump and extract the
> passwords.

Hey, I just had a quasi identical situation last week. I captured 2 Gb
of trafic while arp-spoofing some hosts (during an internal pentest) and
I had to extract as much information as possible from my pcap files.

In my opinion, searching strings like "passwd" or "password" in the pcap
files (or the output of "tethereal -V") is just non productive. You will
not catch Unicoded text, neither X11 MIT-Cookies or SMB shared files
containing clear text passwords.

So, I've replay several times the pcap files on a private/virtual VMWare
LAN (using tcpreplay at speed x 3), while running differents tools to
extract data : dnsiff ("clear text" passwords), Cain & Abel (LM and NTLM
hashes), smbspy (juicy Word and Excel files ;-), ... This solution is
really efficient (replaying 2 hours of trafic in less than 20 minutes)
and allows the pentester to use numerous softwares running on different
OS (here Linux and Windows) and not supporting natively the import of
pcap files.

Regards,

-- 
Nicolas Gregoire ----- Consultant en Sécurité des Systèmes d'Information
ngregoire@exaprobe.com ------[ ExaProbe ]------ http://www.exaprobe.com/
PGP KeyID:CA61B44F  FingerPrint:1CC647FF1A55664BA2D2AFDACA6A21DACA61B44F


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:26 EDT