Brute Shark Network Analysis

The Shark είναι ένα network analysis (NFAT) for , ανάλυση, επεξεργασία άλλα και συλλογή πακέτων δικτύου (κυρίως PCAP). Περιλαμβάνει: εξ κωδικών πρόσβασης, δημιουργία χαρτογράφισης δικτύου, ανακατασκευή συνεδριών TCP, of hashed passwords and even converting them to Hashcat format in order to perform an offline Brute Force attack.

 

The main goal of the program is to provide a reliable solution to penetration testers and network administrators in order to control network traffic, while trying to identify vulnerabilities that can be used by a potential intruder to gain access to critical network points.

Two versions of Brute Shark are available, one based on the GUI (Windows) and one with a command line interface (Windows and Linux).

The various functions of the program can also be used independently as an infrastructure for analyzing network traffic on Linux or Windows computers.

The project was developed in my spare time to address my two main passions: software architecture and network data analysis.

Operation of the program

  • Export and encode user credentials
  • Extract hashes and break through hashcat
  • Create a network diagram
  • TCP connection reconstructions
Password Extracting (HTTP, TELNET, IMAP, FTP, SMTP)

Hashes Extracting (HTTP-Digest, NTLM, CRAM-MD5)

Building a Diagram

Reconstruct all TCP Sessions

File Carving

Brute Shark CLI

Download

wget https://github.com/odedshimon/BruteShark/releases/latest/download/BruteSharkCli.zip unzip BruteSharkCli.zip mono BruteSharkCli / BruteSharkCli.exe

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).