Brute Shark Network Analysis

Brute Shark is one (NFAT) for collecting, parsing, processing, and collecting network packets (mainly PCAP files). Includes: passwords, create network mapping, reconstruct TCP sessions, extract hashed passwords, and even convert them to Hashcat format in order to perform an offline Brute Force attack.

 

The main goal of the program is to provide a reliable solution to and network administrators in order to control network traffic while trying to identify weaknesses that can be used by a potential attacker to gain access to critical points in the network.

Two Brute Shark versions are available, one based on the GUI () and one with a command line interface (Windows and Linux).

The various functions of the program can also be used independently as an infrastructure for analyzing network traffic on Linux or Windows computers.

The project was developed in my spare time to address two of my main passions: software architecture and analysis network.

Operation of the program

  • Export and encode user credentials
  • Extract hashes and break through hashcat
  • Create a network diagram
  • TCP connection reconstructions
Password Extracting (HTTP, TELNET, IMAP, FTP, SMTP)

Hashes Extracting (HTTP-Digest, NTLM, CRAM-MD5)

Building a Network Diagram

Reconstruct all TCP Sessions

File Carving

Brute Shark CLI

Download

wget https://github.com/odedshimon/BruteShark/releases/latest/download/BruteSharkCli.zip unzip BruteSharkCli.zip mono BruteSharkCli / BruteSharkCli.exe

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).