Wifi names and passwords exfiltrated via DNS with AES256 encryption
This is a quick POC / Guide to how you use the OMG cable with a payload i wrote to exfiltrate saved WiFi names and passwords on a Windows 10 machine. This is something Pentesters often do in order to gain access to a corp. wifi. This version of the plugin ensures the data is encrypted when transferred so the customers data is not in risk of being sniffed byt others listening in on the line.. Find the payload here: https://github.com/hak5/omg-payloads/tree/master/payloads/library/exfiltration/WiFi2DNS_AES256
This is a quick POC / Guide to how you use the OMG cable with a payload i wrote to exfiltrate saved WiFi names and passwords on a Windows 10 machine. This is something Pentesters often do in order to gain access to a corp. wifi. This version of the plugin ensures the data is encrypted when transferred so the customers data is not in risk of being sniffed byt others listening in on the line.. Find the payload here: https://github.com/hak5/omg-payloads/tree/master/payloads/library/exfiltration/WiFi2DNS_AES256