diff --git a/README.md b/README.md index a21ff60..5d0d5fb 100644 --- a/README.md +++ b/README.md @@ -82,9 +82,9 @@
In order to use the Windows payload (payload.dd
), you don't need to connect any jumper wire between pins.
Once passwords have been exported to the .txt
file, payload will send the data to the appointed email using Yahoo SMTP. For more detailed instructions visit a following link. Also, the payload needs to be updated with your SMTP information.
Once passwords have been exported to the .txt
file, payload will send the data to the appointed email using Yahoo SMTP. For more detailed instructions visit a following link. Also, the payload template needs to be updated with your SMTP information, meaning that you need to update RECEIVER_EMAIL
, SENDER_EMAIL
and yours email PASSWORD
. In addition, you could also update the body and the subject of the email.
Once passwords have been exported from the computer, data will be saved to the appointed USB flash drive. In order for this payload to function properly, it needs to be updated with the correct name of your USB drive, meaning you will need to replace UsbStick with the name of your USB drive in two places.
-https://github.com/AleksaMCode/WiFi-password-stealer/blob/e9a2376c00412d9021514e2131d23068a5762d5c/payload/payload_linux.dd#L3 +https://github.com/AleksaMCode/WiFi-password-stealer/blob/e9a2376c00412d9021514e2131d23068a5762d5c/payload/payload_linux.template.dd#L3 -https://github.com/AleksaMCode/WiFi-password-stealer/blob/e9a2376c00412d9021514e2131d23068a5762d5c/payload/payload_linux.dd#L11 +https://github.com/AleksaMCode/WiFi-password-stealer/blob/e9a2376c00412d9021514e2131d23068a5762d5c/payload/payload_linux.template.dd#L11 -In addition, you will also need to update the Linux password in the payload in three places. As stated above, in order for this exploit to be successful, you will need to know the victim's Linux machine password.
+In addition, you will also need to update the Linux PASSWORD in the payload in three places. As stated above, in order for this exploit to be successful, you will need to know the victim's Linux machine password, which makes this attack less plausible.
-https://github.com/AleksaMCode/WiFi-password-stealer/blob/e9a2376c00412d9021514e2131d23068a5762d5c/payload/payload_linux.dd#L7 +https://github.com/AleksaMCode/WiFi-password-stealer/blob/e9a2376c00412d9021514e2131d23068a5762d5c/payload/payload_linux.template.dd#L7 -https://github.com/AleksaMCode/WiFi-password-stealer/blob/e9a2376c00412d9021514e2131d23068a5762d5c/payload/payload_linux.dd#L9 +https://github.com/AleksaMCode/WiFi-password-stealer/blob/e9a2376c00412d9021514e2131d23068a5762d5c/payload/payload_linux.template.dd#L9 #### Bash scriptIn order to run the wifi_passwords_print.sh
script you will need type in the following command in you terminal:
NetworkManager is based on the concept of connection profiles, and it uses plugins for reading/writing data. It uses .ini-style
keyfile format and stores network configuration profiles. The keyfile is a plugin that supports all the connection types and capabilities that NetworkManager has. The files are located in /etc/NetworkManager/system-connections/. Based on the keyfile format, the payload uses the grep
command with regex in order to extract data of interest. For file filtering, a modified positive lookbehind assertion was used ((?<=keyword)
). While the positive lookbehind assertion will match at a certain position in the string, sc. at a position right after the keyword without making that text itself part of the match, the regex (?<=keyword).*
will match any text after the keyword. This allows the payload to match the values after SSID and psk (pre-shared key) keywords.