Projects STRLCPY PCredz Commits 0f944350
🤬
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■ ■
    Readme.md
    1  -#Features:
     1 +# PCredz
     2 + 
     3 +This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
     4 + 
     5 +## Features
    2 6   
    3 7  - Extract from a pcap file or from a live interface:
    4 8   - Credit card numbers
    skipped 9 lines
    14 18  - All hashes are displayed in a hashcat format (use -m 7500 for kerberos, -m 5500 for NTLMv1, -m 5600 for NTLMv2).
    15 19  - Log all credentials to a file (CredentialDump-Session.log).
    16 20   
    17  -#Install:
     21 +## Install
    18 22   
    19  -- Linux:
     23 +### Linux
    20 24   
    21  -On a debian based OS: apt-get install python-libpcap
     25 +On a debian based OS bash:
    22 26   
    23  -On Kali, you will need to: apt-get remove python-pypcap && apt-get install python-libpcap
     27 +```bash
     28 +apt-get install python-libpcap
     29 +```
    24 30   
    25  -- Os X and other distributions:
     31 +On Kali, you will need to:
     32 + 
     33 +```bash
     34 +apt-get remove python-pypcap && apt-get install python-libpcap
     35 +```
     36 + 
     37 +### OSX and other distributions
    26 38   
     39 +```bash
    27 40  wget http://downloads.sourceforge.net/project/pylibpcap/pylibpcap/0.6.4/pylibpcap-0.6.4.tar.gz
    28  - 
    29 41  tar xvf pylibpcap-0.6.4.tar.gz
    30  - 
    31 42  cd pylibpcap-0.6.4
    32  - 
    33 43  python setup.py install
    34  - 
     44 +```
    35 45   
    36  -#Usage:
     46 +## Usage
    37 47  
     48 + ```
     49 + # extract credentials from a pcap file
    38 50  ./Pcredz -f file-to-parse.pcap
    39 51   
     52 +# extract credentials from all pcap files in a folder
    40 53  ./Pcredz -d /tmp/pcap-directory-to-parse/
    41 54   
     55 +# extract credentials from a live packet capture on a network interface
    42 56  ./Pcredz -i eth0
     57 +```
    43 58   
    44  -Options:
     59 +### Options
    45 60   
     61 +```bash
    46 62   -h, --help show this help message and exit
    47  - 
    48 63   -f capture.pcap Pcap file to parse
    49  - 
    50 64   -d /home/pnt/pcap/ Pcap directory to parse recursivly
    51  - 
    52 65   -i eth0 interface for live capture
    53  - 
    54 66   -v More verbose.
    55  - 
    56  - 
     67 +```
    57 68   
    58 69   
Please wait...
Page is in error, reload to recover