/crackwatch

Crackwatch monitors a specified password cracking process and posts periodic updates to slack.

Primary LanguagePython

crackwatch

Crackwatch monitors a specified password cracking process and posts periodic updates to slack. I've used it successfully with hashcat and mdxfind, but it should be able to work with others, like john. Be sure to specify the full path to the potfile, if it's not in the same directory. The interval is the length of time between updates, in minutes. For example, 60 would post updates every hour. Your webhook url should be set as an environment variable before starting crackwatch.

This can be adapted to pretty much any webhook. PRs are welcome.

Note: there is a bash version in the master branch.


requirements: slack webhook url (https://api.slack.com/incoming-webhooks) Once you have obtained a webhook url, add it to your environment variables. Example: export WEBHOOK_URL=https://your.webhook/here

usage: python3 crackwatch.py -p <process> -f <potfile> -i <interval>

          <process> is the process you want to monitor
          <potfile> is the output file from that process
          <interval> is how often (in minutes) you want slack updates

example: python3 crackwatch.py hashcat hashcat.pot 60