Network Traffic Credential Hunting

🎯 Overview

Network traffic credential hunting focuses on intercepting and analyzing unencrypted network communications to extract credentials, authentication tokens, and sensitive information. While most modern applications use encryption (TLS/SSL), legacy systems, misconfigured services, and test environments often still transmit credentials in cleartext.

"Legacy systems, misconfigured services, or test applications launched without HTTPS can still result in the use of unencrypted protocols, presenting valuable opportunities for credential hunting."

πŸ”“ Cleartext vs Encrypted Protocols

Common Unencrypted Protocols

Unencrypted Protocol
Encrypted Counterpart
Description
Credential Risk

HTTP

HTTPS

Web pages and resources

⚠️ Forms, Basic Auth, Cookies

FTP

FTPS/SFTP

File transfer

⚠️ Username/Password in AUTH

SNMP

SNMPv3 (encrypted)

Network device monitoring

⚠️ Community strings

POP3

POP3S

Email retrieval

⚠️ Username/Password

IMAP

IMAPS

Email access

⚠️ Username/Password

SMTP

SMTPS

Email sending

⚠️ AUTH credentials

LDAP

LDAPS

Directory services

⚠️ Bind credentials

Telnet

SSH

Remote terminal

⚠️ All keystrokes

DNS

DNS over HTTPS (DoH)

Domain resolution

⚠️ Query information

SMB v1/v2

SMB 3.0 with TLS

File sharing

⚠️ NTLM hashes

VNC

VNC with TLS/SSL

Remote desktop

⚠️ Passwords, screen data

Risk Assessment

πŸ” Wireshark Analysis Techniques

Essential Wireshark Filters

Network and Transport Layer Filters

Protocol-Specific Filters

Advanced Filtering Techniques

Wireshark Search Techniques

Following TCP Streams

πŸ› οΈ Pcredz - Automated Credential Extraction

Installation and Setup

Pcredz Usage

Basic Analysis

Live Traffic Analysis

Pcredz Extraction Capabilities

Supported Credential Types

Example Pcredz Output

🌐 Protocol-Specific Analysis

HTTP Credential Hunting

HTTP Basic Authentication

HTTP Form Authentication

HTTP NTLM Authentication

FTP Analysis

FTP Command Sequence

FTP Data Analysis

SNMP Community String Extraction

Email Protocol Analysis

POP3 Credential Extraction

SMTP Authentication

πŸ•΅οΈ Advanced Network Hunting Techniques

Network Reconnaissance from Traffic

Wireless Network Credential Hunting

VPN and Tunneled Traffic

🎯 HTB Academy Lab Exercise

Lab Setup

  • Objective: Analyze demo.pcapng for credential extraction

  • Tools: Wireshark and Pcredz

  • Target Information: Mixed network traffic with cleartext credentials

Lab Questions and Analysis

Question 1: Credit Card Information

Objective: Find cleartext credit card number Analysis approach:

Question 2: SNMPv2 Community String

Objective: Extract SNMP community string Analysis approach:

Question 3: FTP Password

Objective: Find FTP login password Analysis approach:

Question 4: Downloaded File

Objective: Identify file downloaded via FTP Analysis approach:

Systematic Analysis Workflow

πŸ“‹ Network Credential Hunting Checklist

Pre-Analysis Setup

Protocol Analysis

Automated Analysis

Manual Verification

Reporting

πŸ›‘οΈ Detection and Prevention

Network Security Recommendations

Network Monitoring

πŸ’‘ Key Takeaways

  1. Legacy protocols - Many environments still use unencrypted protocols

  2. Wireshark mastery - Essential for network traffic analysis

  3. Pcredz efficiency - Automates credential extraction from captures

  4. Protocol knowledge - Understanding authentication flows is crucial

  5. Stream analysis - Following TCP conversations reveals full context

  6. Pattern recognition - Learn to identify credential-bearing traffic

  7. Automated tools - Combine manual analysis with automated extraction

  8. Defense awareness - Recommend encrypted alternatives


This guide provides comprehensive network traffic credential hunting techniques using Wireshark and Pcredz, based on HTB Academy's Password Attacks module.

Last updated