-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathPKG-INFO
102 lines (86 loc) · 4.02 KB
/
PKG-INFO
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
Metadata-Version: 2.1
Name: PasswordsSniffer
Version: 0.0.2
Summary: This module sniff username and password of unprotected protocols.
Home-page: https://github.com/mauricelambert/PasswordsSniffer
Author: Maurice Lambert
Author-email: [email protected]
Maintainer: Maurice Lambert
Maintainer-email: [email protected]
License: GPL-3.0 License
Download-URL: https://mauricelambert.github.io/info/python/security/PasswordsSniffer.pyz
Project-URL: Executable, https://mauricelambert.github.io/info/python/security/PasswordsSniffer.pyz
Project-URL: Documentation, https://mauricelambert.github.io/info/python/security/PasswordsSniffer.html
Description: # PasswordsSniffer
## Description
This module sniff username and password of unprotected protocols.
## Requirements
This package require:
- python3
- python3 Standard Library
- Scapy
## Installation
```bash
pip install PasswordsSniffer
```
## Usages
### Command line
```bash
PasswordsSniffer
python3 -m PasswordsSniffer
python3 PasswordsSniffer.pyz
PasswordsSniffer test # test all available class
PasswordsSniffer -i "localhost" # change iface
PasswordsSniffer --iface "localhost" # change iface
PasswordsSniffer -P 2323 # Add analysis on server response on port 2323
PasswordsSniffer --add-response-ports 2323 # Add analysis on server response on port 2323
PasswordsSniffer -p 8080 # Add analysis on client request on port 8080
PasswordsSniffer --add-request-ports 8080 # Add analysis on client request on port 8080
PasswordsSniffer --add-string "Password: " # Detect a packet if "Password: " is in TCP Raw content
PasswordsSniffer -s "Password: " # Detect a packet if "Password: " is in TCP Raw content
PasswordsSniffer -l 20 # Change log level
PasswordsSniffer --log-level 20 # Change log level
```
### Python script
```python
from PasswordsSniffer import *
sniffer = SnifferAll()
sniffer.start()
```
```python
import PasswordsSniffer
from scapy.all import TCP
class CustomSniffer(PasswordsSniffer.SnifferTelnet):
def __init__(self):
super().__init__()
self.ports = [2323]
self.protocol = TCP
self.strings = [b'Password: ']
self.regexs = [r'\w:\s?$'.encode()]
self.request_detection_ports = self.ports
self.response_detection_ports = self.ports
sniffer = CustomSniffer()
sniffer.start()
```
## Links
- [Pypi](https://pypi.org/project/PasswordsSniffer)
- [Github](https://github.com/mauricelambert/PasswordsSniffer)
- [Documentation](https://mauricelambert.github.io/info/python/security/PasswordsSniffer.html)
- [Python executable](https://mauricelambert.github.io/info/python/security/PasswordsSniffer.pyz)
## License
Licensed under the [GPL, version 3](https://www.gnu.org/licenses/).
Keywords: PasswordsSniffer
Platform: Windows
Platform: Linux
Platform: MacOS
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python
Classifier: Natural Language :: English
Classifier: Development Status :: 5 - Production/Stable
Classifier: Operating System :: MacOS :: MacOS X
Classifier: Operating System :: Microsoft :: Windows
Classifier: Operating System :: POSIX
Classifier: Environment :: Console
Classifier: Topic :: System :: Networking
Requires-Python: >=3.6
Description-Content-Type: text/markdown