s0lst1c3 / eaphammer

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
GNU General Public License v3.0
2.12k stars 307 forks source link

Option to save passwords/hashes to output file #125

Open Script-Nomad opened 4 years ago

Script-Nomad commented 4 years ago

Is your feature request related to a problem? No, it's more of a "nice to have" sort of thing.

Describe the solution you'd like It would be helpful if hashes and/or plaintext passwords captured by eaphammer were able to be saved to their own unique files in the loot folder or a directory of the user's choice. It's not like it's super inconvenient or anything for me to do some grep-magic to yank user hashes out of the hostapd output log, and drop them into a file, but it would be really nice if eaphammer did it for you. It would also pave the way to be able to send hashes to a hash-cracking server via the autocrack feature down the road.

Describe alternatives you've considered You could always just tell me to "shut up and grep it." :man_shrugging:

s0lst1c3 commented 4 years ago

This is something I'd like to see as well. :) It shouldn't be terribly difficult to implement either. I'll add it to EAPHammer's internal issue tracker (which I should really make public). Thanks for suggesting this.