Passive Network Credential Capture
Monitor network traffic to identify hosts, capture cleartext credentials, and extract authentication hashes from unencrypted protocols.
Passive capture is stealthy and doesn’t generate malicious traffic, making it ideal for initial reconnaissance and credential harvesting.
Quick Reference
# Wireshark GUI |
Wireshark
# Start Wireshark with sudo |
tcpdump
# Basic capture |
Pcredz
# Install Pcredz |
net-creds
# Install net-creds |
Responder (Analyze Mode)
# Passive listening (no poisoning) |
Common Workflow
# Step 1: Start packet capture |
Wireshark Analysis Techniques
# Identify hosts |
Protocol-Specific Captures
# HTTP Basic Authentication |
Notes
What Can Be Captured:
Cleartext protocols:
- HTTP (credentials, cookies, tokens)
- FTP (username, password)
- Telnet (everything)
- SMTP (email credentials)
- POP3 (email credentials)
- IMAP (email credentials)
- LDAP (bind credentials)
- SNMP (community strings)
- DNS (queries, responses)
Authentication hashes:
- NTLMv1/v2 (challenge-response)
- Kerberos (AS-REQ, TGS-REQ)
- NTLM over HTTP
- NTLM over SMB
Other sensitive data:
- Credit card numbers
- Social security numbers
- API keys
- Session tokens
- Cookies
- Form data
Network Discovery:
From passive capture, identify:
- Active hosts (IP addresses)
- MAC addresses
- Hostnames (DNS, DHCP, LLMNR)
- Operating systems (TTL, TCP options)
- Services (port numbers)
- Domain names
- Network topology
- Routing information
ARP Analysis:
# Filter: arp |
MDNS Analysis:
# Filter: mdns |
DHCP Analysis:
# Filter: dhcp |
DNS Analysis:
# Filter: dns |
Pcredz Capabilities:
Extracts:
- Credit card numbers
- POP credentials
- SMTP credentials
- IMAP credentials
- SNMP community strings
- FTP credentials
- HTTP Basic/NTLM credentials
- HTTP form data
- NTLMv1/v2 hashes (SMB, HTTP, LDAP, MSSQL)
- Kerberos AS-REQ Pre-Auth (etype 23)
Wireshark Display Filters:
Useful filters:
http.request # All HTTP requests |
Capture Best Practices:
Positioning:
- Capture on network segment with target traffic
- Use port mirroring/SPAN if possible
- Position between clients and servers
Duration:
- Capture during business hours
- Longer captures = more data
- Balance storage vs. coverage
Storage:
- Captures can be large (GB/hour)
- Use rotating captures
- Compress old captures
Filtering:
- Capture everything, filter during analysis
- Use BPF filters for specific traffic
- Save filtered results separately
Legal and Ethical:
- Only capture with authorization
- Understand privacy implications
- Secure captured data
- Follow data retention policies
- Don’t capture personal data unnecessarily
- Document all activities
Detection Avoidance:
Passive capture is stealthy:
- No packets sent
- No ARP requests
- No DNS queries
- No connection attempts
- Hard to detect
But consider:
- Promiscuous mode may be detectable
- Physical access may be logged
- Network taps may be visible
Common Findings:
Typical discoveries:
- FTP credentials (very common)
- HTTP Basic Auth (common)
- Telnet sessions (rare but valuable)
- SNMP community strings (common)
- NTLMv2 hashes (common in Windows)
- Email credentials (POP3/IMAP)
- Database credentials (MySQL, MSSQL)
Analysis Workflow:
Quick scan:
- Protocol hierarchy
- Endpoints
- Conversations
Credential search:
- Run Pcredz
- Search for “password”
- Check FTP/HTTP/SMTP
Hash extraction:
- Filter for NTLM
- Filter for Kerberos
- Extract challenge-response
Sensitive data:
- Search for SSN patterns
- Search for credit cards
- Check form data
Documentation:
- Save findings
- Screenshot evidence
- Export relevant packets
Wireshark Tips:
- Use coloring rules for quick identification
- Create custom columns for specific fields
- Save frequently used filters
- Use “Follow Stream” for context
- Export specific packets for sharing
- Use “Expert Info” for anomalies
tcpdump vs Wireshark:
tcpdump:
- Command-line
- Lightweight
- Good for remote capture
- Less analysis features
Wireshark:
- GUI
- Rich analysis features
- Better for deep analysis
- More resource intensive
Performance Considerations:
- Large captures slow down Wireshark
- Use display filters, not capture filters
- Close unused protocol dissectors
- Increase memory if needed
- Split large captures into smaller files
Post-Capture Actions:
Once credentials found:
- Verify credentials
- Test for password reuse
- Check privilege levels
- Document findings
- Attempt lateral movement
- Continue enumeration
Common Pitfalls:
- Capturing on wrong interface
- Not enough disk space
- Missing promiscuous mode
- Filtering too aggressively
- Not saving captures
- Losing capture files
- Not documenting findings
Advanced Techniques:
SSL/TLS Decryption:
- Requires private key
- Or SSLKEYLOGFILE
- Decrypt HTTPS traffic
VoIP Analysis:
- Extract phone calls
- Analyze SIP/RTP
- Reconstruct audio
Malware Analysis:
- Extract malware from traffic
- Analyze C2 communication
- Identify IOCs
Troubleshooting:
Common issues:
- No packets captured: Check interface, permissions
- Encrypted traffic: Can’t decrypt without keys
- Missing credentials: May be encrypted or not present
- Large files: Split or filter
- Slow analysis: Use filters, close dissectors