Skip to content

THTC/pina-colada

 
 

Repository files navigation

Piña Colada Build Status

Piña Colada, a powerful and extensible wireless pineapple, capable of performing a wide range of remote offensive attacks on a network. It can currently be controlled only via a command line interface, but a Command and Control remote server functionality is coming soon. An Android app allows you to control the Piña Colada via the Command and Control server.

Please only use Piña Colada with explicit permission - please don't hack without asking.

Usage

Piña Colada comes with a number of built-in capabilities, and more can be dynamically added at any time. "Capabilities" are simply modules written to accomplish a task, such as a ARP Spoofing, DNS Poisoning, DOSing a user, etc. Piña Colada can be controlled using a familiar Metasploit like interface ("use" engages a capability, option setting works the same, etc), and is both quick to deploy and easy to use.

To start Piña Colada, first ensure that you have the required dependencies. Scapy is the backbone of the project, so make sure you install it before running. More dependencies may be added as the project is extended, so make sure your installation remains up to date as it's updated. An automatic deployment package is coming soon.

Launching Piña Colada:

$ sudo python cli.py
    ____  _  /\//          ______      __          __        ' .
   / __ \(_)//\/ ____ _   / ____/___  / /___ _____/ /___ _   \~~~/
  / /_/ / / __ \/ __ `/  / /   / __ \/ / __ `/ __  / __ `/    \_/
 / ____/ / / / / /_/ /  / /___/ /_/ / / /_/ / /_/ / /_/ /      Y
/_/   /_/_/ /_/\__,_/   \____/\____/_/\__,_/\__,_/\__,_/      _|_
Welcome to Pina Colada, a powerful Wifi Pineapple. Type "help" to see the list of available commands.
>>

Controlling the Pi

Piña Colada has a number of commands that enable to you to control different aspects about the pi and the network.

Enabling/disabling Promiscuous Mode:

>> promisc enable
+ Promiscuous Mode enabled for interface eth0.

Controlling operating interface:

>> interface eth0
 + Successfully changed interface to eth0. Using local IP 10.0.0.56.

Enumerating the Network:

>> discover
Begin emission:
Finished to send 256 packets.

Received 0 packets, got 0 answers, remaining 256 packets
ID	IP		MAC			Ports	Last Date
61	10.0.0.1	00:0c:29:5f:e7:50		2016-11-01 15:34:40
62	10.0.0.32	d0:50:99:86:92:1a		2016-11-01 03:23:21
63	10.0.0.34	80:2a:a8:80:b1:82		2016-11-01 15:34:40
...
>> 

Executing Commands:

Piña Colada also operates as a fall-through shell. For example:

>> netstat -plant
 + Executing "netstat -plant"
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      605/sshd
...
>> msfconsole
       =[ metasploit v4.12.32-dev                         ]
+ -- --=[ 1587 exploits - 905 auxiliary - 273 post        ]
+ -- --=[ 457 payloads - 39 encoders - 8 nops             ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]

msf > quit
>> 

Capabilities

Out of the box, Piña Colada comes with many, many capabilities, and more can be added dynamically at any time. These capabilities are organized into categories. Currently, the following attacks are supported:

  1. Packet Sniffing - Passively sniffs the network and logs all traffic recorded
  2. Scanning - standard scanning types are implemented, and Piña Colada often out performs nmap for the same scan type
  3. TCP Hangups (from tcpkiller)
  4. ARP Spoofing and Man In The Middle Attacks
  5. MS08 Exploitation
  6. Many, many, many more coming soon!

To see a full list of available capabilities, run "list":

>> list
 + Available capabilities:
  + auxiliary
   - reverse_shell
  + dos
   - syn
   - land
   - tcpkiller
  + arp
   - arpSpoof
   - arpDos
  + sniff
   - sniffPack
  + exploitation
   - dnsSpoof2
   - ms08
   - dnsSpoof
  + scan
   - syn
   - nmapScan
   ...
>>

To engage a capability for use, simply use the command "use":

>> use dos/syn
(Syn Flood) >>

Once a capability has been loaded, you can view options using a familiar "show options", and set each option by simply running "set ":

>> set port 12345 
 + port => 12345

Persistence

Once loaded, all capabilities are persistent within Piña Colada's interface. This allows for multiple capabilities to be engaged simultaneously, and seamlessly transition between them.

>> use dos/syn
(Syn Flood) >> launch
 + Launching Syn Flood...
Type 'restore' when ready to stop the attack.
(Syn Flood) >> quit
>> use dos/land
(Land Attack) >> launch
 + Launching Land Attack
 Sent 2000 packets.
>> use dos/syn
(Syn Flood) >> restore
 + Restoring target...

Even as the land attack is engaged, the syn flood is still operating in the background.

Interface

Additionally, Piña Colada supports full autocomplete of all capabilities (including recursively through depth), so you can start typing the following:

>> use rever<tab>

immediately autocompletes to:

>> use auxiliary/reverse_shell

Making it easy and fast to load arbitrary capapbilities quickly.

Contributing

Piña Colada is still very much in its infancy! Feel free to contribute to the project - simply fork it, make your changes, and issue a pull request. Have an idea for a killer capability, or something we could improve? Make an issue and we'll add it ASAP!

If you wish to add your own capability, follow the directions given in the pina-colada/capabilities/template.py file.

About

A powerful and extensible wifi pineapple

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 85.0%
  • HTML 10.4%
  • CSS 4.6%