Network Traffic Credential Hunting
π― Overview
Network traffic credential hunting focuses on intercepting and analyzing unencrypted network communications to extract credentials, authentication tokens, and sensitive information. While most modern applications use encryption (TLS/SSL), legacy systems, misconfigured services, and test environments often still transmit credentials in cleartext.
"Legacy systems, misconfigured services, or test applications launched without HTTPS can still result in the use of unencrypted protocols, presenting valuable opportunities for credential hunting."
π Cleartext vs Encrypted Protocols
Common Unencrypted Protocols
HTTP
HTTPS
Web pages and resources
β οΈ Forms, Basic Auth, Cookies
FTP
FTPS/SFTP
File transfer
β οΈ Username/Password in AUTH
SNMP
SNMPv3 (encrypted)
Network device monitoring
β οΈ Community strings
POP3
POP3S
Email retrieval
β οΈ Username/Password
IMAP
IMAPS
Email access
β οΈ Username/Password
SMTP
SMTPS
Email sending
β οΈ AUTH credentials
LDAP
LDAPS
Directory services
β οΈ Bind credentials
Telnet
SSH
Remote terminal
β οΈ All keystrokes
DNS
DNS over HTTPS (DoH)
Domain resolution
β οΈ Query information
SMB v1/v2
SMB 3.0 with TLS
File sharing
β οΈ NTLM hashes
VNC
VNC with TLS/SSL
Remote desktop
β οΈ Passwords, screen data
Risk Assessment
π Wireshark Analysis Techniques
Essential Wireshark Filters
Network and Transport Layer Filters
Protocol-Specific Filters
Advanced Filtering Techniques
Wireshark Search Techniques
Manual Packet Search
Following TCP Streams
π οΈ Pcredz - Automated Credential Extraction
Installation and Setup
Pcredz Usage
Basic Analysis
Live Traffic Analysis
Pcredz Extraction Capabilities
Supported Credential Types
Example Pcredz Output
π Protocol-Specific Analysis
HTTP Credential Hunting
HTTP Basic Authentication
HTTP Form Authentication
HTTP NTLM Authentication
FTP Analysis
FTP Command Sequence
FTP Data Analysis
SNMP Community String Extraction
Email Protocol Analysis
POP3 Credential Extraction
SMTP Authentication
π΅οΈ Advanced Network Hunting Techniques
Network Reconnaissance from Traffic
Wireless Network Credential Hunting
VPN and Tunneled Traffic
π― HTB Academy Lab Exercise
Lab Setup
Objective: Analyze demo.pcapng for credential extraction
Tools: Wireshark and Pcredz
Target Information: Mixed network traffic with cleartext credentials
Lab Questions and Analysis
Question 1: Credit Card Information
Objective: Find cleartext credit card number Analysis approach:
Question 2: SNMPv2 Community String
Objective: Extract SNMP community string Analysis approach:
Question 3: FTP Password
Objective: Find FTP login password Analysis approach:
Question 4: Downloaded File
Objective: Identify file downloaded via FTP Analysis approach:
Systematic Analysis Workflow
π Network Credential Hunting Checklist
Pre-Analysis Setup
Protocol Analysis
Automated Analysis
Manual Verification
Reporting
π‘οΈ Detection and Prevention
Network Security Recommendations
Network Monitoring
π‘ Key Takeaways
Legacy protocols - Many environments still use unencrypted protocols
Wireshark mastery - Essential for network traffic analysis
Pcredz efficiency - Automates credential extraction from captures
Protocol knowledge - Understanding authentication flows is crucial
Stream analysis - Following TCP conversations reveals full context
Pattern recognition - Learn to identify credential-bearing traffic
Automated tools - Combine manual analysis with automated extraction
Defense awareness - Recommend encrypted alternatives
This guide provides comprehensive network traffic credential hunting techniques using Wireshark and Pcredz, based on HTB Academy's Password Attacks module.
Last updated