Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mainframed/mfsniffer
Mainframe TN3270 unencrypted TSO session user ID and password sniffer
https://github.com/mainframed/mfsniffer
Last synced: 15 days ago
JSON representation
Mainframe TN3270 unencrypted TSO session user ID and password sniffer
- Host: GitHub
- URL: https://github.com/mainframed/mfsniffer
- Owner: mainframed
- Created: 2012-12-03T06:39:53.000Z (almost 12 years ago)
- Default Branch: master
- Last Pushed: 2023-06-06T06:04:10.000Z (over 1 year ago)
- Last Synced: 2024-07-31T05:26:14.273Z (3 months ago)
- Language: Python
- Size: 195 KB
- Stars: 46
- Watchers: 8
- Forks: 18
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-network-stuff - **38**星
README
## MF Sniffer
Script to capture unencrypted TSO login credentials
**Requirements**: Python, scapy and IP/Port of mainframe
**Created by**: Soldier of Fortran (@mainframed767)
**Use**: Given an interface, IP and port this script will try to sniff mainframe user IDs and passwords sent over cleartext using TN3270 (tested against x3270 and TN3270X). This scrypt does not work if the mainframe is using SSL encryption (default port 923).
## Arguments:
-h, --help show this help message and exit
-a IP, --ip IP Mainframe TN3270 server IP address
-p PORT, --port PORT Mainframe TN3270 server listening port (e.g 23, 2323, 623, etc)
-i INTERFACE, --interface INTERFACE network interface to listen on
## Screenshot
![ScreenShot](https://raw.github.com/mainframed/MFSniffer/master/MFSniffer-Screenshot.png)