Network Traffic Credential Hunting
π― Overview
π Cleartext vs Encrypted Protocols
Common Unencrypted Protocols
Unencrypted Protocol
Encrypted Counterpart
Description
Credential Risk
Risk Assessment
π Wireshark Analysis Techniques
Essential Wireshark Filters
Network and Transport Layer Filters
Protocol-Specific Filters
Advanced Filtering Techniques
Wireshark Search Techniques
Manual Packet Search
Following TCP Streams
π οΈ Pcredz - Automated Credential Extraction
Installation and Setup
Pcredz Usage
Basic Analysis
Live Traffic Analysis
Pcredz Extraction Capabilities
Supported Credential Types
Example Pcredz Output
π Protocol-Specific Analysis
HTTP Credential Hunting
HTTP Basic Authentication
HTTP Form Authentication
HTTP NTLM Authentication
FTP Analysis
FTP Command Sequence
FTP Data Analysis
SNMP Community String Extraction
Email Protocol Analysis
POP3 Credential Extraction
SMTP Authentication
π΅οΈ Advanced Network Hunting Techniques
Network Reconnaissance from Traffic
Wireless Network Credential Hunting
VPN and Tunneled Traffic
π― HTB Academy Lab Exercise
Lab Setup
Lab Questions and Analysis
Question 1: Credit Card Information
Question 2: SNMPv2 Community String
Question 3: FTP Password
Question 4: Downloaded File
Systematic Analysis Workflow
π Network Credential Hunting Checklist
Pre-Analysis Setup
Protocol Analysis
Automated Analysis
Manual Verification
Reporting
π‘οΈ Detection and Prevention
Network Security Recommendations
Network Monitoring
π‘ Key Takeaways
Last updated