eapmd5pass
eapmd5pass extracts challenge-response pairs from EAP-MD5 authentication exchanges and performs offline dictionary attacks to crack user passwords. It works with live monitor-mode interfaces or libpcap capture files.
Description
EAP-MD5 is a legacy authentication mechanism lacking sufficient protection for user credentials, exposing them to offline dictionary attacks. eapmd5pass targets this vulnerability by capturing EAP-MD5 exchanges from wireless networks.
The tool reads from a live network interface in monitor mode or a stored libpcap file, extracting the challenge and response portions of the authentication exchange. It then mounts an offline dictionary attack using a provided wordlist to recover the user's password.
Use cases include testing wireless networks still using EAP-MD5 for authentication, demonstrating the insecurity of this protocol, and assessing password strength in such environments.
How It Works
eapmd5pass captures EAP-MD5 packets containing the challenge and MD5-hashed response (which is MD5(challenge + username + password)). It extracts these values along with the EAP ID and username. An offline dictionary attack is then performed by computing MD5(challenge + username + candidate_password) for each wordlist entry and comparing against the captured response. The tool supports both live sniffing on monitor-mode interfaces and offline analysis of libpcap files.
Installation
sudo apt install eapmd5passFlags
Examples
eapmd5pass -heapmd5pass -i wlan0mon -w /usr/share/wordlists/rockyou.txteapmd5pass -r capture.pcap -w passwords.txteapmd5pass -r capture.pcap -b AA:BB:CC:DD:EE:FF -w dict.txteapmd5pass -U user -C 0123456789abcdef -R fedcba9876543210 -E 1 -w wordlist.txteapmd5pass -i mon0 -w /path/to/custom-dict.txt -b 00:11:22:33:44:55eapmd5pass -r eapmd5_capture.pcap