TCM-Sec's Windows WiFi Extractor
Contributed to open source pentesting software
About
Contributed to TCM Security's development of their Windows WiFi Extractor tool.
The program is designed to dump WiFi SSIDs and plaintext keys from Windows hosts utilizing the built-in netsh utility.
Forked the original repo and converted the code to run in-memory only, as the original code created files (and therefore traces) on the victim computer.
As a result: removed reliance on hard-coded integer accessors to parsed XML data and moved to a human-readable JSON format.
Postmortem
When you get excited to contribute to a cybersec superstar's repo because you see an obvious code optimization, don't forget to erase hard-coded sensitive information from testing prior to making a pull request... Whoops! 😬
Last updated