07 March 2008 | 7,558 views

Ferret Version 1.1 – Data Seepage Detection Tool

Check Your Web Security with Acunetix

Ferret works on the concept of “data seepage”: bits of benign data that people willingly broadcast to the world (as opposed to “leakage”, which is data people want to hide from the world).

Examples of data seepage are what happens when you power-on your computer. It will broadcast to the world the list of WiFi access-points you’ve got cached on your computer, the previous IP address you used (requested by DHCP), your NetBIOS name, your login ID, and a list of servers (via NetBIOS request) you want connections to.

Even if you then establish a VPN connection to hide everything else, you’ve already broadcasted this information to everyone on the local network.

The FERRET tool gathers this broadcasted information and correlates it. It demonstrates how much you expose to hackers.

The latest version of the Data Seepage detection tool, Ferret, is available for download. It is still in a rough form but compiles cleanly on Linux and Windows. A number of bug fixes have been introduced as well as new functionality.

You can download the Blackhat slides here:


Get Ferret 1.1 here:


Or read more here.


Recent in Hacking Tools:
- XSSYA v2.0 Released – XSS Vulnerability Confirmation Tool
- wig – CMS Identification & Information Gathering Tool
- Appie – Portable Android Security Testing Suite

Related Posts:
- WifiZoo v1.3 Released – Passive Info Gathering for Wifi
- WifiZoo v1.2 – Gather Wifi Information Passively
- wig – WebApp Information Gatherer – Identify CMS

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,896,814 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,114,213 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 637,306 views

Low-cost VPS Hosting

7 Responses to “Ferret Version 1.1 – Data Seepage Detection Tool”

  1. ZaD MoFo 7 March 2008 at 11:15 am Permalink

    Curiosity kill cats – I might get a try with FERRET 1.1 to correlate what is captured before initialisation and capture with Wireshark…

    I am using Wireshark as a monitor tool. A neat piece of software! On the other hand, it does not capture well thoses first bytes sent unless asked after a router purge and other arcane “twiddles” forcing re-interrogation. Even to late in autostart mode (Am I missing tomething?)

  2. zupakomputer 7 March 2008 at 6:40 pm Permalink

    How about an OS that doesn’t automatically cache any of those things. They must exist already (ie – pre-configured, of course you can make your own versions); I’m new to all this and yet to get to play with most of the toys.

  3. Pantagruel 9 March 2008 at 9:43 pm Permalink

    MMM linux compiled ok but doesn’t want to work with the onboard eth of my epia box :( (keep nagging ERR:libpcap: no adapters found, are you sure you are root? eventhough I am root.

    MS visual suite 2008 gives lot’s of warnings and some fatal errors
    (among which ../ferret.exe : fatal error LNK1120: 1 unresolved externals)

    Any of you had any luck yet??

  4. elpeor 10 March 2008 at 10:48 am Permalink

    In gentoo compiled well and works perfect.
    I just discovered that I forgot to use ssl for a mail account, hahaha, and the password appeared in the output…

  5. James C 10 March 2008 at 4:41 pm Permalink

    im have no luck compiling it on XP, could use cygwin i guess. working on ubuntu with no trouble.

  6. mauro 16 February 2009 at 10:09 pm Permalink

    have someone compiled ferret 1.1 successfully?
    i cant do it with dev c++, gives me erros.
    can somoene help me?

  7. mauro 16 February 2009 at 10:10 pm Permalink

    i use vista and ferret v1.0 works fine