https://github.com/Xenios91/Secrets-Extractor
A tool to check packets for secrets
https://github.com/Xenios91/Secrets-Extractor
packet-analyser packets security-tools
Last synced: 4 months ago
JSON representation
A tool to check packets for secrets
- Host: GitHub
- URL: https://github.com/Xenios91/Secrets-Extractor
- Owner: Xenios91
- License: mit
- Created: 2022-05-22T17:14:11.000Z (about 3 years ago)
- Default Branch: master
- Last Pushed: 2024-12-19T05:04:00.000Z (7 months ago)
- Last Synced: 2024-12-19T05:29:29.654Z (7 months ago)
- Topics: packet-analyser, packets, security-tools
- Language: Go
- Homepage:
- Size: 1.81 MB
- Stars: 5
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: license
Awesome Lists containing this project
README
# Secrets Extractor
[](https://github.com/Xenios91/Secrets-Extractor/actions/workflows/codeql-analysis.yml)
[](https://github.com/Xenios91/Secrets-Extractor/actions/workflows/go.yml)## General Information
- Author: Corey Hartman
- Language: Golang v1.23
- Description: Traverses packet captures/live traffic and extracts: usernames, passwords, session id's, basic auth, and cookies from HTTP traffic.## Installation/Compilation
- Requires Golang v1.23
- DevContainer included within the project.
- libpcap-dev required ```sudo apt install libpcap-dev -y```
- With in the projects root directory run ```go build .```## Utilization
- Set the pcap file to check ```-file=myPcapToScan.pcap```- Set the file to output secrets to ```-output=fileToDumpSecretsTo.json```
- Example ```./passession-extractor -file=myPcapCapture.pcap -output=secrets_dump.json```
- Note - If the ```-file``` flag is not utilized, a live capture will be initiated. To utilize live capture, ensure the user you are running as has permissions to perform a packet capture.