== Ettercap login repository version 1.0 ==

INTRO
=====

Fed up with all the credentials you got from ettercap and don't know how to handle them ?
access.pl is made for you.

BASICS
======

It imports credentials exported via etterlog -p.
Store them into a database.
Provides search capabilities.
Allows export back to an "etterlog -p" format.
Launch and use ? to get help.
Any question -> look at the source


REQUIREMENTS
============

Requires perl DBI and DBD::SQLite modules.
Requires you know what your doing.

HOW-IT-WORKS
============

0. Welcome screen
-----------------

[root@basecamp]# ./access.pl

*****************************
* Ettercap login repository *
*****************************

Database loaded with 260 credentials.

? for help

>

1. Getting help
---------------

> ?

--------------------------------------
    Ettercap login repository v1.0
           by Renaud Bidou
renaud (at) iv2-technologies (dot) com
--------------------------------------


---[ Command line shell

l|list  [TARGET]     counts stolen credential of TYPE
                           provides details for TARGET

TYPE                       r|resource = Resource (IP, FQDN)
                           l|login = Login name
                           s|service = Network service (http, ftp, ldap...)

i|import [FILENAME]        imports data from FILENAME into the local DB
                           Import file must be generated by etterlog -p

e|export [FILENAME]        exports data to FILENAME into etterlog generated format

                  Search for PATTERN into Login, Resource and Services

q                          Quit


---[ Examples

> l s
Lists counts of stolen credential per service

> l s ldap
Provides details (Login, Password, Service and IP/FQDN) for all LDAP stolen
 credential

> free
Lists counts of all stolen credentials related to Resources, Login and Services
containing the PATTERN "free" (case insensitive)


---[ Requirements

You need the access.sqlite database in the directory of the script.
You also need DBI and DBD::SQLite PERL modules


---[ EOF

2. Import etterlog file
-----------------------


> import ../data/access.txt
Import Completed. 16 credentials added.

>

3. List logins
--------------

> l l

Login                                        Stolen
----------------------------------------     ------

aaa@aaa.com                                  [2]
aaa@bbb.com                                  [1]
ccc@ccc.com                                  [2]
USER1                                        [2]
USER2                                        [1]

> l l aaa@aaa.com

Stolen Credentials for : aaa@aaa.com
Login                              Password            Service        Info
------------------------------     ---------------     ----------     ----------
aaa@aaa.com                        yyGXrKGK            ldap           10.1.1.110
aaa@aaa.com                        yyGXrKGK            http           private.aaa.com/internal/login.php

4. List resources
-----------------

> l r

Target                                       Stolen
----------------------------------------     ------
10.1.1.107                                   [2]
10.1.1.110                                   [50]
www.aaa.com                                  [1]
www.bbb.com                                  [2]
www.ccc.com                                  [1]

> l r 10.1.1.107

Stolen Credentials for : 10.1.1.107
Login                              Password            Service        Info
------------------------------     ---------------     ----------     ----------
johnny.rotten                      joHkubJJ            http           10.1.1.107
admin                              h7rsd4Er,U          http           10.1.1.107

5. List services
----------------

> l s

Service                                      Stolen
----------------------------------------     ------
ftp                                          [4]
http                                         [171]
ldap                                         [87]
snmp                                         [1]

> l s ftp

> l s ftp

Stolen Credentials for : ftp
Login                              Password            Service        Info
------------------------------     ---------------     ----------     ----------
__user__                           __pass__            ftp            192.169.12.3
anonymous                          Squid@              ftp            192.54.34.190
rb133179                           gloups              ftp            mx2.blah.com
abracadabra                        magic2010           ftp            ftp.socool.org

6. Global research
------------------

> notfree

Target                                       Stolen
----------------------------------------     ------
dl.notfree.fr                                [1]
mysite.notfree.fr                            [1]
sowhat.notfree.fr                            [2]
subscribe.notfree.fr                         [3]
zimbra.notfree.fr                            [4]

Login                                        Stolen
----------------------------------------     ------
muahah@notfree.fr                            [1]
myname@notfree.fr                            [1]

7. Export
---------

> e backup.txt
Export Completed. 276 credentials exported in backup.txt.

>

CONTACT
=======

renaud (at) iv2-technologies (d0t) com