-
Notifications
You must be signed in to change notification settings - Fork 7
/
Copy pathREADME
50 lines (36 loc) · 1.64 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
dechap v0.4 Alpha
Written by Foeh Mannay, October 2013
PURPOSE
=======
dechap is a tool which attempts to recover login credentials from captured
PPPoE, RADIUS and L2TP CHAP authentications plus MD5 authenticated OSPF or BGP
traffic. It strips away any 802.1Q tags and / or MPLS labels which are present
to get to the good stuff and then runs a dictionary attack against any
authentications it finds.
Please see http://networkingbodges.blogspot.com/ for more information on the
theory behind this if you are interested.
INSTALLATION
============
Provided the OpenSSL dev libraries are installed it should be possible to simply
extract the source code, cd into the directory then run "make".
USAGE
=====
There are only two parameters and both are mandatory. You must specify your
capture file (original pcap format) with the -c flag and your word list with
the -w flag. Here's an example:
lab@lab:~/dechap$ ./dechap -w mywords.txt -c someauths.cap
Found password "tangerine" for user [email protected].
Unable to find a password for user [email protected].
Found password "password1" for user [email protected].
Found password "Africa" for user [email protected].
Found password "Frankenstein" for user [email protected].
Found password "s3cr3tk3y" for OSPF host 10.1.1.1 key 1.
Found password "t1nt3rn3t" for TCP from 10.0.0.2 to 10.0.0.1.
lab@lab:~/dechap$
CHANGE LOG
==========
v0.1a First working release, only works with PPPoE traffic.
v0.2a Added support for RADIUS and L2TP captures.
Fixed a bug in MPLS decap.
v0.3a Added support for MD5 authenticated OSPF.
v0.4a Added support for MD5 authenticated BGP.