A python script, to automatically generate the arguments for Joshua Wright’s ‘asleap’ program.
This video demostrates an offline (asleap) and online (THC-pptp-bruter) attack on MSCHAP v2 software VPN.
Watch video on-line:
From wireshark (and a Man In The Middle attack), you can get “CHAP Challenge” and “CHAP Response”. We can break theses values down:
CHAP Challenge = Auth Challenge (16 bytes)
CHAP Response = Peer Challenge (16 bytes) and Peer Response (24 bytes)
After finding “Auth Challenge and Peer Challenge” we can add these to the username and hash (sha1) the result. This will generate the “Challenge”.
Once we have the challenge, we can feed this into the asleap, along with CHAP Challenge.
This script does all the work for you (and more), it just needs the values from wireshark for it to work. As well as having the option for different styles of attack, you can either uses a dictionary/wordlist or use ‘Genkeys’ to generate a look up file for asleap (which is recommended). Also by using this, you can automatically run asleap with your arguments.
- The script - chap2asleap.py
Home Page: http://www.willhackforsushi.com/Asleap.html
Home Page: http://freeworld.thc.org
Home Page: https://blog.g0tmi1k.com/
Download Link: [http://github.com/g0tmi1k/]]99
How to use chap2asleap.py
- chmod 755 chap2asleap.py
- python chap2asleap.py
1 2 3 4 5 6 7 8 9 10 11 12 13
Video length: 03:03
Capture length: 5:48
2011-04-05 - v0.2
- [>] Updated