Pina Colada, a powerful and extensible wireless drop box, capable of performing a wide range of remote offensive attacks on a network. It can currently be controlled only via a command line interface, but a Command and Control remote server functionality is coming soon. An Android app allows you to control the Pina Colada via the Command and Control server.
Pina Colada comes with a number of built-in capabilities, and more can be dynamically added at any time. “Capabilities” are simply modules written to accomplish a task, such as a ARP Spoofing, DNS Poisoning, DOSing a user, etc. Pina Colada can be controlled using a familiar Metasploit like interface (“use” engages a capability, option setting works the same, etc), and is both quick to deploy and easy to use.
To start Pina Colada, first ensure that you have the required dependencies. Scapy is the backbone of the project, so make sure you install it before running. More dependencies may be added as the project is extended, so make sure your installation remains up to date as it’s updated. An automatic deployment package is coming soon.
Launching Pina Colada:
$ sudo python cli.py ____ _ /\// ______ __ __ ' . / __ \(_)//\/ ____ _ / ____/___ / /___ _____/ /___ _ \~~~/ / /_/ / / __ \/ __ `/ / / / __ \/ / __ `/ __ / __ `/ \_/ / ____/ / / / / /_/ / / /___/ /_/ / / /_/ / /_/ / /_/ / Y /_/ /_/_/ /_/\__,_/ \____/\____/_/\__,_/\__,_/\__,_/ _|_ Welcome to Pina Colada, a powerful Wifi Drop Box. Type "help" to see the list of available commands. >>
Out of the box, Piña Colada comes with many, many capabilities, and more can be added dynamically at any time. These capabilities are organized into categories. Currently, the following attacks are supported:
To see a full list of available capabilities, run “list”:
>> list + Available capabilities: + auxiliary - reverse_shell + dos - syn - land - tcpkiller + arp - arpSpoof - arpDos + sniff - sniffPack + exploitation - dnsSpoof2 - ms08 - dnsSpoof + scan - syn - nmapScan ... >>
Piña Colada has a number of commands that enable to you to control different aspects about the pi and the network.
Enabling/disabling Promiscuous Mode:
>> promisc enable + Promiscuous Mode enabled for interface eth0.
Controlling operating interface:
>> interface eth0 + Successfully changed interface to eth0. Using local IP 10.0.0.56.
Enumerating the Network:
>> discover Begin emission: Finished to send 256 packets. Received 0 packets, got 0 answers, remaining 256 packets ID IP MAC Ports Last Date 61 10.0.0.1 00:0c:29:5f:e7:50 2016-11-01 15:34:40 62 10.0.0.32 d0:50:99:86:92:1a 2016-11-01 03:23:21 63 10.0.0.34 80:2a:a8:80:b1:82 2016-11-01 15:34:40 ... >>
Piña Colada also operates as a fall-through shell. For example:
>> netstat -plant + Executing "netstat -plant" Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 605/sshd ... >> msfconsole =[ metasploit v4.12.32-dev ] + -- --=[ 1587 exploits - 905 auxiliary - 273 post ] + -- --=[ 457 payloads - 39 encoders - 8 nops ] + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ] msf > quit >>