Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANWtx00dJKbr44JoL5JbqyFL0gSnnRPvcBr+Su0W9TOG09ncRA@mail.gmail.com>
Date: Thu, 13 Dec 2018 11:07:06 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: question - hash extraction from .cap tcpdump files

On Thu, Dec 13, 2018 at 9:23 AM JohnyKrekan <krekan@...nykrekan.com> wrote:

> Hello, I want to ask whether you could recommend an utility which would
> allow me to extract hashes (and plain passwords as well) so I could later
> use those hashes with John for testing their security.
> Nice day
> Johny Krekan

John can do this already when you provide the pcap's for traffic: VNC, WiFi
(PSK), EIGRP, HSRP, IKE-PSK, Gadu-Gadu, Kerberos, SSH and others:
https://openwall.info/wiki/john/sample-non-hashes
https://openwall.info/wiki/john/WPA-PSK
As far as plain-passwords you probably want to look at sniffing them with a
filter applied to tcpdump/wireshark which is beyond the scope of this list.
A qucik search turned up some useful results
https://www.google.com/search?q=pcap+filter+plain+text+passwords
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.