How to Extract Plaintext Wi-Fi Passwords (with Rust)
ฝัง
- เผยแพร่เมื่อ 17 ก.ค. 2024
- jh.live/keeper || Keeper Security offers a privileged access management solution to deliver enterprise grade protection all in one unified platform -- keep your users, your data, and your environment secure with Keeper! jh.live/keeper
Special thanks to colleagues @MEhrn00 and @Nordgaren for all their help in preparing this video 🙏
Free Cybersecurity Education and Ethical Hacking with John Hammond
🔥TH-cam ALGORITHM ➡ Like, Comment, & Subscribe!
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
1:30 missed opportunity to say "I am little RUSTY"
this man is my favorite cyber sec channel i love his contents
Yup! Him, David Bombal, and NetworkChuck as well 👍🏽
Cyberspatial was a good one too - but I think he stopped making videos
@@stopper0203 Should I check it out though he may not be up to date with his content?
Hi John, I enjoy all of your videos. But I want to add something here, the WiFi passwords are encrypted in Windows using DPAPI. So, only the user who connected to the WiFi can see the password. For example, if on the same system user A connected to the WiFi "test" the user B can't read the password, it only can read the SSID. DPAPI is used a lot on Windows and other apps too, for example Chrome uses it to store your credentials in an encrypted way but that is not very secure as any one who has a session to your user can decrypt these credentials without specifying any decryption password
I somehow love those videos, but the programming flies right over my head, every time xD
or just open up command prompt and run a simple command to view the saved passwords.
Djude this is awesome , thanks for teaching us bro. 💪😃🖖
It would be cool if the code for the project was included in your github or somewhere in the description!
I think they like doing that. Self pleasure, I don't know. This happens in a lot of channels.
Are you allocating memory for the pointers you pass into windows functions?
No, They are null pointers. The function expects a pointer to a pointer, so he is making a null ptr, with std::ptr::null_mut(), and passing a mutable reference to that pointer to the function. Windows then allocates memory and writes the allocated address to the pointer reference that was passed it. It's why we have to call the WlanFreeMemory function on those pointers. Because the Wlan library is what is allocating the memory, not the Rust program.
@@nordgaren2358 Aha so the function allocates the memory needed. Thanks!
I thought rust is a game
We raid here, but we raid the computer.
If Rust was made with Rust, Rust would be good, because Rust is good...
@@Alfred-Neuman😬🥴😵
Funniest comment I saw all day 🤣 😂
@@Alfred-Neumanlol, good one
You got your own way of typing. It withs for you, but it's weird to watch.. in a good way though. Great video
I recently started a new IT job with limited documentation and essentially no IT dept, so I had to use the line in the beginning to get the password for future device onboardings.
rust is indeed hardcore 😅
more rust!!
I have also like this but it was built in batch script, using netsh command and export as XML
how to extract password from sqlite3 files saved in the application
Good video - thanks for the share
You helped me to scaring my neighbors😂😂😂😂😂
Thank you brother am from marocco
Does not work on Windows 11. I enter "Failed to get auth for this profile".
so the api doc is in C++
Hammond's the CodeKeeper 🥵🥵
But what about EDR, IDS/IPS? I have a hard time believing techniques like this will work against an enterprise solution like crowdstrike. It's cool I guess.
I unfortunately don't have a CrowdStrike sandbox to test personally, but I reached out to someone in the Discord who had and they tried it -- no alerts with CrowdStrike Falcon sensor running, from what they shared. SmartScreen would naturally pop up since it is currently an unsigned binary, though.
@@_JohnHammond Thank you for verifying your claims, I love you very much
I work for one of these companies and you would be surprised how many things don't get flagged, you got to keep in mind that they are trying to create alerts for one size fits all by default. Companies want actionable alerts so wayyyy too much gets left on the wayside because it creates work to tune lol... honest truth.
i love your video , but for the next time could you move your camera away from the code
Sorry, didn't work on my linux machine
I love educational content ❤
EDR injection can be bypassed
I think john jump shipped and turned team GUI.- Loads happens between fingers and the display ive always heard.
Can't you just also, Settings > WiFi > "Network Name" > View Wi-Fi security key? 0:27
I have a question? How do you research tools and techniques?
Google. GitHub. Training material like Maldev Academy. Joining communities related to the tools you are trying to make and asking questions.
Existing tools on GitHub are extremely helpful. Working code is always some of the best documentation.
In this case, you could even learn how to make this tool just by looking at the Microsoft documentation!
Read CVEs
anyone know what keyboard john is using?
i think its 60 or 65% keyboard dont know about name maybe razer?
It's a custom keyboard, I believe. He talked about it on a stream about 3 weeks ago maybe 4?
Early crew. Shalom. :3
I guess I should be able to do this with Osquery since devices trust the program. 😅
what a legend!
Bravo!!
awesome ❤
Nice another Hacking video🤩
Interesting....🤔
Where password on new connection wifi?
W video bro 🎉
How to analyse a malware that have (img , doc , xsl ) extension
For images the first step I guess exif
For xsl this first step confirm if their are no white text on white background
For doc turn on ports scanning and set up trusted IP. Then double-click to open the file. Note: it may be tricky sometimes so check for changes in your registry
@@AGASTRONICS thanks a lot 🙂
@@locaboy336 that advice is awful btw, it's easy to see file, registry and network changes. Do a malware analysis course and you'll learn this at the beginner level.
how about wpa2 enterprise? (username, pw)
Hello My Friend.
thumbnail made it look like it's specifically attacking iphones for wifi passwords.
Love From India ❤
Hey John what's the best way to get more involved in ethical hacking? Started cybersecurity few months ago.
do you really think you are in any way different from the 100s of the same generic annoying questions he gets like yours
@@ggsap
I need to know how to ethically hack Fortnite V-Bucks?
Asking for a friend...
😂
@@ggsap shut up \^_^/
did I say I was any different chill tf out. It never hurts to ask a question. I was looking through comments on his other videos for an answer to a similiar question and hadnt seen it asked. Worse thing that could happen is no response big fuckin deal. you out here wasting energy over being negative rather than answering a simple question to someone who is seeking knowledge most likely in a position you once were in previously. If being a prick on the internet gets you off or something have it 😉@@ggsap
what is the editor name
Its RustRover from Jetbrains
@@julfoi2139 ohh thanks a lot !
Years ago
The windows crate is awfully documented and I hate my life each time I open it.
First! ❤
Oooo so rust isnt a game? Hahaha
You not giving us code🙂
I thought that a person who is "new" in Rust should struggle while writing a code...😅
Why rust? C# IDEs have linter for win32 api
Just less likely for an AV to flag on a Rust compiled binary-- you can't as easily do as much introspection and analysis that you would be able to do on a C# exe
like if you're vibing to the beat in the intro
I use Rust, btw
The new "I use Arch btw"
Hy how are you
16:44 - 18:22 I think there was an editing error
You are right -- thank you!! Fixing now. :)
The entire Windows system should have a CVE. Change my mind.
Mr Can we hack but only use a mobile phone?
Неплохо,но слишком просто
quick tip: Press alt+enter or whtvr the keybind is to auto import all the stuff. Please stop manually doing this, it triggers me. Just Alt+Enter and all will be fine
"cyber security professional" "uses tiktok"
“Types with middle finger”
Title is a bit misleading isn’t it?
what would you like the title to be instead
@@_JohnHammond Using the Win32 API to grab ClearText passwords. Love the videos btw
Hahahhahahhahahahahhahahahahah you cannot show at me wlan
ةذج
1.2 mln sub and you claim Windows STORES passwords in clear text? Revealing sth in clear text and storing in clear text is not the same...
Use macros #[
wtf didnt know this existed. Makes inputting a wifi password on behalf of the user pointless.
This only works if the user has already entered the password for the wifi connection once and windows saved it.