nethunter-app icon indicating copy to clipboard operation
nethunter-app copied to clipboard

view wifi passwords module

Open vay3t opened this issue 8 years ago • 3 comments

suggestion:

  1. Create a module for wifi passwords "nethunter" (one click) and other utilities.
  2. Add simple reverse shells https://vay3t.github.io/Reverse-Shells/ with netcat or similar (not always we will have metasploit). like a mpc https://github.com/g0tmi1k/mpc and also for HID attack (the idea is to have these two alternatives: 1- to copy the code and then later use. 2- be able to use in an attack HID).
  3. For HID attack is a good idea to broaden the range of attacks: the possibility of designing a customized list (like custom commands) to run a more personalized attack.

vay3t avatar Jul 25 '16 19:07 vay3t

  1. Could you explain 1 more
  2. Would be easy in duckhunter there are some example presets which are stored here: https://github.com/offensive-security/nethunter-app/tree/master/assets/nh_files/duckyscripts and menu options are here: https://github.com/offensive-security/nethunter-app/blob/master/src/com/offsec/nethunter/DuckHunterFragment.java#L425. It would just be matter of developing a reverse shell list OR another dropdown for just reverse shells.
  3. Is above what you are thinking of or are you thinking of more powershell HID attacks (not ducky)

binkybear avatar Jul 26 '16 01:07 binkybear

honestly I had forgotten the usefulness of "DuckHunter" (the habit of frequently using HID). other utilities: so far no other than #133 (lately have occupied much --half-duplex but I have my doubts whether it is really necessary to create a new module as mitmf.)

vay3t avatar Jul 26 '16 15:07 vay3t

one idea is to add a module to exploitation NFC

vay3t avatar Aug 02 '16 06:08 vay3t