Skip to content

Mainframe TN3270 unencrypted TSO session user ID and password sniffer

Notifications You must be signed in to change notification settings

mainframed/MFSniffer

Repository files navigation

MF Sniffer

Script to capture unencrypted TSO login credentials

Requirements: Python, scapy and IP/Port of mainframe

Created by: Soldier of Fortran (@mainframed767)

Use: Given an interface, IP and port this script will try to sniff mainframe user IDs and passwords sent over cleartext using TN3270 (tested against x3270 and TN3270X). This scrypt does not work if the mainframe is using SSL encryption (default port 923).

Arguments:

-h, --help show this help message and exit

-a IP, --ip IP Mainframe TN3270 server IP address

-p PORT, --port PORT Mainframe TN3270 server listening port (e.g 23, 2323, 623, etc)

-i INTERFACE, --interface INTERFACE network interface to listen on

Screenshot

ScreenShot

About

Mainframe TN3270 unencrypted TSO session user ID and password sniffer

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages