Skip to content

How to crack an OSPF MD5 hash manually.

Notifications You must be signed in to change notification settings

shaheemirza/OSPFMD5Crack

Repository files navigation

OSPFMD5Crack

How to crack on OSPF MD5 hash manually

The author has nothing to do with those who will use this tool for personal purposes to destroy other people's computer networks. The tools are presented for training purposes to help engineers improve the security of their network.

1. Traffic dump

You can open Wireshark and capture the traffic. Save it to a pcapng file.

2. Extracting hashes using Ettercap

Using the Ettercap utility, we will be able to extract net-MD5 hashes from the traffic dump. OSPF uses net-MD5 hash. If you copy the hash value from the header Authentication Crypt Data and try to crack the password using the brute-force method, nothing will work.

Let's run Ettercap in console mode and feed it a traffic dump (a file with the extension .pcapng)

ettercap -Tqr ospf_md5_dump.pcapng

Using the cut, we will process the file with the hashes that Ettercap gave us.

cat raw-hashes.txt | cut -d ":" -f 2 >> net-md5-hashes.txt

3. Cracking net-MD5 hashes with John

Using John, we pass a file with hashes and a dictionary to the input. (brute-force attack)

john net-md5-hashes.txt --wordlist=brute.txt

Let's check the validity of the password and try to connect to the OSPF domain. Using FRRouting. Cracked password - c1$c0

We were able to crack the password from the OSPF domain and connect to the routing domain in area 0

About

How to crack an OSPF MD5 hash manually.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published