A tool for parsing and decrypting MS-CHAPv2 network handshakes.
-
The first thing you'll need to do is obtain the network traffic for the MS-CHAPv2 handshake you'd like to crack.
For PPTP VPN connections, simply use a tool such as tcpdump or wireshark in order to obtain a network capture. For WPA2 Enterprise wireless handshakes, simply use a tool like FreeRADIUS-WPE in order to obtain 'challenge' and 'response' parameters.
-
Next you'll use
chapcrack
in order to parse and extract the MS-CHAPv2 handshake from your packet capture or FreeRADIUS interception.- For a PPTP handshake, run:
chapcrack.py parse -i /path/to/capture.cap
- For a WPA2 handshake, run
chapcrack.py radius -C <challenge> -R <response>
, wherechallenge
andresponse
are what you intercepted with FreeRADIUS-WPE
- For a PPTP handshake, run:
-
Submit the CloudCracker token
chapcrack
gives you to https://www.cloudcracker.com -
When you get your results, you can decrypt a PPTP packet capture:
chapcrack.py decrypt -i </path/to/capture.cap> -o output.cap -n <result>
Have a bug? Please create an issue here on GitHub!
https://github.com/moxie0/chapcrack/issues
Copyright 2012 Moxie Marlinspike
Licensed under the GPLv3: http://www.gnu.org/licenses/gpl-3.0.html