Skip to content
forked from lgandx/PCredz

This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.

Notifications You must be signed in to change notification settings

basicScandal/PCredz

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 

Repository files navigation

#Features:

  • Extract from a pcap file or from a live interface:

    • Credit card numbers
    • POP
    • SMTP
    • IMAP
    • SNMP community string
    • FTP
    • HTTP Basic
    • NTLMv1/v2 (DCE-RPC,SMBv1/2,LDAP, MSSQL, HTTP, etc)
    • Kerberos (AS-REQ Pre-Auth etype 23) hashes.
  • All hashes are displayed in a hashcat format (use -m 7500 for kerberos, -m 5500 for NTLMv1, -m 5600 for NTLMv2).

  • Log all credentials to a file (CredentialDump-Session.log).

#Install:

  • Linux:

On a debian based OS: apt-get install python-libpcap

On Kali, you will need to: apt-get remove python-pypcap && apt-get install python-libpcap

  • Os X and other distributions:

wget http://downloads.sourceforge.net/project/pylibpcap/pylibpcap/0.6.4/pylibpcap-0.6.4.tar.gz

tar xvf pylibpcap-0.6.4.tar.gz

cd pylibpcap-0.6.4

python setup.py install

#Usage:

./Pcredz -f file-to-parse.pcap

./Pcredz -d /tmp/pcap-directory-to-parse/

./Pcredz -i eth0

Options:

-h, --help show this help message and exit

-f capture.pcap Pcap file to parse

-d /home/pnt/pcap/ Pcap directory to parse recursivly

-i eth0 interface for live capture

-v More verbose.

About

This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published