Chapcrack is a tool for parsing and decrypting MS-CHAPv2 handshakes. In order to use it, a packet with an MS-CHAPv2 network handshake must be obtained. The tool is used to parse relevant credentials from the handshake. In other words, Chapcrack parses the credential information out of MS-CHAPv2 handshakes, sends to Cloudcracker which in turn will return a packet that can be decrypted by Chapcrack to recover the password.
The resulting file (“token”) is then submitted to CloudCracker, an online password cracking service for penetration testers and network auditors, which returns the cracked MD4 hash in under a day. For each handshake, it outputs the username, known plaintext, two known ciphertexts, and will crack the third DES key. Whats interesting to know is that Cloudcracker your handshake information to a Pico Computing’s DES cracking box, which is powered by a FPGA box that implemented DES as a real pipeline, with one DES operation for each clock cycle. With 40 cores at 450mhz, that’s 18 billion keys/second!
The hash is inserted into chapcrack, and the entire network capture is decrypted. Alternatively, it can be used to login to the user’s or WPA2 Enterprise radius server. All of this is possible only because of the weak protocol architecture that allows MD4 hash of the user’s password to be authenticated as them, as well as to decrypt any of their traffic.
How to use chapcrack?
- Obtain a packet capture with an MS-CHAPv2 network handshake in it ( or WPA2 Enterprise handshake, for instance).
- Use chapcrack to parse relevant credentials from the handshake (chapcrack parse -i path/to/capture.cap).
- Submit the CloudCracker token to www.cloudcracker.com
- Get your results, and decrypt the packet capture (chapcrack decrypt -i path/to/capture.cap -o output.cap -n )