The tool is called chapcrack, and in order to use it, a packet with an MS-CHAPv2 network handshake must be obtained. The tool is used to parse relevant credentials from the handshake.
The resulting file ("token") is then submitted to CloudCracker, an online password cracking service for penetration testers and network auditors, which returns the cracked MD4 hash in under a day.
The hash is inserted into chapcrack, and the entire network capture us decrypted. Alternatively, it can be used to login to the user's VPN service or WPA2 Enterprise radius server.
More details about how the MS-CHAPv2 authentication protocol and the chapcrack tool work can be found in an in-depth blog post by Marlinspike himself.
"All users and providers of PPTP VPN solutions should immediately start migrating to a different VPN protocol. PPTP traffic should be considered unencrypted. Enterprises who are depending on the mutual authentication properties of MS-CHAPv2 for connection to their WPA2 Radius servers should immediately start migrating to something else," he says, and specifies OpenVPN and IPsec (in certificate rather than PSK mode) as good alternatives.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.