asleap
asleap is a tool for actively recovering LEAP and PPTP passwords by exploiting deficiencies in Cisco LEAP networks. It uses dictionary files with NT hashes and libpcap captures to crack authentication credentials.
Description
asleap demonstrates a serious deficiency in proprietary Cisco LEAP networks, allowing recovery of passwords from captured authentication exchanges. The tool works with LEAP and PPTP protocols by processing challenge-response pairs against precomputed hash dictionaries generated by the companion genkeys utility.
Primary use cases include wireless security testing against legacy Cisco LEAP deployments and recovering credentials from captured network traffic. It requires a libpcap capture file containing LEAP authentication exchanges or direct challenge/response values. The tool supports both file-based dictionary attacks and real-time capture processing.
The workflow typically involves generating a hash lookup database with genkeys from a wordlist, then using asleap to match captured authentication data against this database. This offline cracking approach efficiently recovers NT hashes and plaintext passwords from LEAP exchanges.
How It Works
asleap recovers LEAP passwords by matching captured challenge-response pairs against a precomputed lookup table of NT hashes generated from wordlists by genkeys. LEAP authentication uses a challenge-response mechanism where the client computes NTLM hash responses to server challenges. asleap parses libpcap captures to extract username, challenge, and 24-byte response values, then performs binary searches on the indexed hashfile using the last two hash bytes as a filter. Successful matches reveal the corresponding NT hash and original plaintext password. The -s flag skips post-authentication verification checks.
Installation
sudo apt install asleapFlags
Examples
genkeys -r /usr/share/wordlists/nmap.lst -f asleap.dat -n asleap.idxasleap -r leap.dump -f asleap.dat -n asleap.idx -sasleap -C 58:16:d5:ac:4b:dc:e4:0f -R 50:ae:a3:0a:10:9e:28:f9:33:1b:44:b1:3d:9e:20:91:85:e8:2e:c3:c5:4c:00:23 -W password.lstasleap -hgenkeys -hgenkeys -r /usr/share/wordlists/nmap.lst -f asleap.dat -n asleap.idx -h 4a39