|
Message-ID: <8F4CBD92C1074F599FEB37A48282E2FB@apple9d23c8f76> Date: Thu, 13 Dec 2018 19:49:08 +0100 From: "JohnyKrekan" <krekan@...nykrekan.com> To: <john-users@...ts.openwall.com> Subject: Re: question - hash extraction from .cap tcpdump files thanx for answers. Johny ----- Original Message ----- From: "JJ Gray" <jj@....qinetiq.com> To: <john-users@...ts.openwall.com> Sent: Thursday, December 13, 2018 5:16 PM Subject: Re: [john-users] question - hash extraction from .cap tcpdump files > Ettercap -r can likely do a fast sift on plain-text. > > Cheers, > JJ > > On 13/12/2018 16:07, Rich Rumble wrote: >> On Thu, Dec 13, 2018 at 9:23 AM JohnyKrekan <krekan@...nykrekan.com> >> wrote: >> >>> Hello, I want to ask whether you could recommend an utility which would >>> allow me to extract hashes (and plain passwords as well) so I could >>> later >>> use those hashes with John for testing their security. >>> Nice day >>> Johny Krekan >> >> John can do this already when you provide the pcap's for traffic: VNC, >> WiFi >> (PSK), EIGRP, HSRP, IKE-PSK, Gadu-Gadu, Kerberos, SSH and others: >> https://openwall.info/wiki/john/sample-non-hashes >> https://openwall.info/wiki/john/WPA-PSK >> As far as plain-passwords you probably want to look at sniffing them with >> a >> filter applied to tcpdump/wireshark which is beyond the scope of this >> list. >> A qucik search turned up some useful results >> https://www.google.com/search?q=pcap+filter+plain+text+passwords >> -rich >> > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.