illwill 147a71fe4f Added browsercreds, wificreds, and mrrobot payloads (#114)
* Initial commit

HID Powershell attack to dump WiFiCreds

* Update readme.md

* changed initial LED blink color to white

* Changed initial LED color to white

* Changed initial LED Color to white

* swapped sync before LED

* switched from powershell to batch

* Update payload.txt

* using powershell again , updated version and LEDs

* using powershell, added usb eject,  Win 7,8,10

* added window resizing to hide payload typing

* Update payload.txt

* pull request

* BrowserCreds Pull

* separate powershell script called from payload

also added result detection

* update LEDs

* Update payload.txt

* initial commit

* Update payload.txt

* initial pull

* initial commit
2017-04-07 15:48:20 +10:00
..

WiFiCreds

  • Author: illwill
  • Version: Version 0.3
  • Target: Windows

Description

Dumps the stored plaintext Wifi SSID & passwords from Windows boxes using Powershell HID attack, then stashes them in /root/udisk/loot/WiFiCreds/

Configuration

None needed.

STATUS

LED Status
White (blinking) Setting up
Blue (blinking) Attack running
Purple (blinking) Dumping WiFi Credentials
Green (blinking) Succeeded Dumping WiFi Credentials
Red (blinking) Failed Dumping WiFi Credentials

Discussion

https://forums.hak5.org/index.php?/topic/40413-payload-wificreds/