A Rust-based brute-force tool that extracts OSPF packets from .pcap or .pcapng files and attempts to recover Cisco OSPF MD5 authentication keys.
This project performs offline cracking only. It reads captured OSPF traffic, reconstructs the MD5 authentication material, and brute-forces possible keys based on a configurable character set and maximum key length.
- Accepts
.pcapand.pcapngpacket capture files. - Automatically extracts OSPF packets that contain MD5 authentication.
- Brute-forces MD5 authentication keys using configurable character sets.
- Parallelized search for faster cracking.
- You provide a capture file containing OSPF traffic with MD5 authentication enabled.
- The tool parses the capture and extracts relevant OSPF packets.
- For each packet, it reconstructs the MD5 input structure.
- The brute-force engine iterates through candidate keys until a match is found.
git clone https://github.com/fuchskurt/cisco_ospf_md5_cracker
cd cisco_ospf_md5_cracker
cargo build --releaseThe resulting binary will be located at:
target/release/crack_tool_cisco_ospf_md5
If a key is found, it will be printed and the process will immediately terminate.
- Cracking time depends heavily on key length and character set size.
- Only use this tool on systems and captures you are authorized to test.
- The tool does not perform any network interaction; it is entirely offline.
This project is licensed under the GPL-3.0 license.
