Fixed up some of the code so that we get less garble on certain packets. We still see that sometimes and it appears that it’s either retrans or fragmented packets, need to do some more debugging to find out.
Newest feature is dumping the authentication challenge and response hash. Both of these can be fed into an accompanying script to brute force the password. I will show an example cracking session later.
Below is an example authentication dump, feel free to crack it, it’s fake.