
  Thoroughly sniff passwords and hashes from an interface or pcap file. Concatenates fragmented packets and does not rely on ports for service identification.

Sniffs
- URLs visited
- POST loads sent
- HTTP form logins/passwords
- HTTP basic auth logins/passwords
- HTTP searches
- FTP logins/passwords
- IRC logins/passwords
- POP logins/passwords
- IMAP logins/passwords
- Telnet logins/passwords
- SMTP logins/passwords
- SNMP community string
- NTLMv1/v2 all supported protocols: HTTP, SMB, LDAP, etc.
- Kerberos
Examples
Auto-detect the interface to sniffsudo python net-creds.pyChoose eth0 as the interface
sudo python net-creds.py -i eth0Ignore packets to and from 192.168.0.2
sudo python net-creds.py -f 192.168.0.2Read from pcap
python net-creds.py -p pcapfile