LinuxCommandLibrary

dsniff

TLDR

Sniff passwords on interface

$ sudo dsniff -i [eth0]
copy
Read from capture file
$ dsniff -p [capture.pcap]
copy
Write to file
$ sudo dsniff -i [eth0] -w [output.txt]
copy
Sniff specific protocols
$ sudo dsniff -i [eth0] -m
copy

SYNOPSIS

dsniff [options]

DESCRIPTION

dsniff is a password sniffer that captures authentication credentials from network traffic. It handles various protocols including FTP, Telnet, HTTP, SNMP, IMAP, LDAP, and others.
The tool is designed for authorized network auditing and security testing, demonstrating the risks of transmitting credentials over unencrypted protocols.

PARAMETERS

-i interface

Network interface to sniff.
-p file
Read from pcap file.
-w file
Write output to file.
-m
Enable automatic protocol detection.
-n
Don't resolve hostnames.
-c
Perform half-duplex TCP stream reassembly.
-d
Enable debugging.

SUPPORTED PROTOCOLS

FTP, Telnet, HTTP, POP, IMAP, LDAP, rlogin, RPC, SNMP, NFS, X11, IRC, AIM, CVS, Citrix, Oracle, PostgreSQL, Sybase, Microsoft SQL

CAVEATS

Only for authorized security testing. Encrypted protocols (SSH, HTTPS) not captured. Requires root/admin privileges. May violate network policies. Protocol detection not perfect.

HISTORY

dsniff was created by Dug Song around 2000 as part of a suite of network auditing tools. It demonstrated the dangers of cleartext authentication, contributing to the push for encrypted protocols. The dsniff suite includes related tools like arpspoof and macof.

SEE ALSO

Copied to clipboard