├── .travis.yml ├── LICENSE ├── README.md ├── app └── App Command Writeup.txt ├── capabilities ├── __init__.py ├── arp │ ├── arpDos.py │ ├── arpSpoof.py │ └── util_arp.py ├── auxiliary │ ├── reverse_shell.py │ └── wifi_connect.py ├── capability.py ├── dos │ ├── land.py │ ├── syn.py │ └── tcpkiller.py ├── exploitation │ ├── dnsSpoof.py │ ├── ms08.py │ ├── sslstrip.py │ └── util_arp.py ├── interface.py ├── option.py ├── scan │ ├── nmapScan.py │ └── syn.py ├── sniff │ └── sniffPack.py └── template.py ├── cert ├── server.crt ├── server.csr ├── server.key └── server.orig.key ├── cli.py ├── client.py ├── core.py ├── network.py ├── pinacolada_website ├── __init__.py ├── static │ ├── background.gif │ ├── bootstrap.min.css │ ├── bootstrap.min.js │ ├── cover.css │ ├── jquery-terminal.min.js │ ├── jquery.min.js │ └── tether.min.js ├── templates │ ├── 404.html │ └── index │ │ ├── command.html │ │ ├── index.html │ │ └── terminal.html └── views │ ├── __init__.py │ └── index.py ├── pip_dependencies ├── scans.py ├── server.py ├── setup ├── setup_postgres.py ├── test_client.py └── tests.py /.travis.yml: -------------------------------------------------------------------------------- 1 | language: python 2 | sudo: required 3 | dist: xenial 4 | python: 5 | - "2.7" 6 | install: 7 | - pip install -r pip_dependencies 8 | - sudo pip install -r pip_dependencies 9 | - sudo -H ./setup 10 | script: sudo nosetests -vv --nocapture 11 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2016 ecthros 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Piña Colada ![Build Status](https://travis-ci.org/ecthros/pina-colada.svg?branch=master) 2 | 3 | Piña Colada, a powerful and extensible wireless drop box, capable of performing a wide range of remote offensive attacks on a network. It can be controlled via it's command line interface, or connect to it's Command and Control remote server to be controlled remotely, either by web application or Android app. 4 | 5 | Please only use Piña Colada with explicit permission - please don't hack without asking. 6 | 7 | [Watch some controlled attacks here.](https://www.youtube.com/playlist?list=PL22Ei9kfayhao0qeotVvlkRtfSRSMGoLq) 8 | 9 | ## General Usage 10 | Piña Colada comes with a number of built-in capabilities, and more can be dynamically added at any time. "Capabilities" are simply modules written to accomplish a task, such as a ARP Spoofing, DNS Poisoning, DOSing a user, etc. Piña Colada can be controlled using a familiar Metasploit like interface ("use" engages a capability, option setting works the same, etc), and is both quick to deploy and easy to use. 11 | 12 | To start Piña Colada, first ensure that you have the required dependencies. [Scapy](http://www.secdev.org/projects/scapy/) is the backbone of the project, so make sure you install it before running. More dependencies may be added as the project is extended, so make sure your installation remains up to date as it's updated. An automatic deployment package is coming soon. 13 | 14 | Launching Piña Colada: 15 | ``` 16 | $ sudo python cli.py 17 | ____ _ /\// ______ __ __ ' . 18 | / __ \(_)//\/ ____ _ / ____/___ / /___ _____/ /___ _ \~~~/ 19 | / /_/ / / __ \/ __ `/ / / / __ \/ / __ `/ __ / __ `/ \_/ 20 | / ____/ / / / / /_/ / / /___/ /_/ / / /_/ / /_/ / /_/ / Y 21 | /_/ /_/_/ /_/\__,_/ \____/\____/_/\__,_/\__,_/\__,_/ _|_ 22 | Welcome to Pina Colada, a powerful Wifi Drop Box. Type "help" to see the list of available commands. 23 | >> 24 | ``` 25 | 26 | ## Controlling the Pi (CLI) 27 | 28 | Piña Colada has a number of commands that enable to you to control different aspects about the pi and the network. 29 | 30 | **Enabling/disabling Promiscuous Mode:** 31 | ``` 32 | >> promisc enable 33 | + Promiscuous Mode enabled for interface eth0. 34 | ``` 35 | 36 | **Controlling operating interface:** 37 | ``` 38 | >> interface eth0 39 | + Successfully changed interface to eth0. Using local IP 10.0.0.56. 40 | ``` 41 | 42 | **Enumerating the Network:** 43 | ``` 44 | >> discover 45 | Begin emission: 46 | Finished to send 256 packets. 47 | 48 | Received 0 packets, got 0 answers, remaining 256 packets 49 | ID IP MAC Ports Last Date 50 | 61 10.0.0.1 00:0c:29:5f:e7:50 2016-11-01 15:34:40 51 | 62 10.0.0.32 d0:50:99:86:92:1a 2016-11-01 03:23:21 52 | 63 10.0.0.34 80:2a:a8:80:b1:82 2016-11-01 15:34:40 53 | ... 54 | >> 55 | ``` 56 | 57 | **Executing Commands:** 58 | 59 | Piña Colada also operates as a fall-through shell. For example: 60 | ``` 61 | >> netstat -plant 62 | + Executing "netstat -plant" 63 | Active Internet connections (servers and established) 64 | Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name 65 | tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 605/sshd 66 | ... 67 | >> msfconsole 68 | =[ metasploit v4.12.32-dev ] 69 | + -- --=[ 1587 exploits - 905 auxiliary - 273 post ] 70 | + -- --=[ 457 payloads - 39 encoders - 8 nops ] 71 | + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ] 72 | 73 | msf > quit 74 | >> 75 | ``` 76 | 77 | ## Capabilities 78 | 79 | Out of the box, Piña Colada comes with many, many capabilities, and more can be added dynamically at any time. These capabilities are organized into the following categories: 80 | 81 | 1. Denial of Service (DOS) 82 | 2. ARP 83 | 3. Sniffing 84 | 4. Exploitation 85 | 5. Scanning 86 | 6. Auxiliary Attacks 87 | 88 | To see a full list of available capabilities, run "list": 89 | 90 | ``` 91 | >> list 92 | + Available capabilities: 93 | + auxiliary 94 | - reverse_shell 95 | + dos 96 | - syn 97 | - land 98 | - [tcpkiller](https://github.com/Kkevsterrr/tcpkiller) 99 | + arp 100 | - arpSpoof 101 | - arpDos 102 | + sniff 103 | - sniffPack 104 | + exploitation 105 | - dnsSpoof2 106 | - ms08 107 | - dnsSpoof 108 | + scan 109 | - syn 110 | - nmapScan 111 | ... 112 | >> 113 | ``` 114 | 115 | To engage a capability for use, simply use the command "use": 116 | 117 | ``` 118 | >> use dos/syn 119 | (Syn Flood) >> 120 | ``` 121 | 122 | Once a capability has been loaded, you can view options using a familiar "show options", and set each option by simply running "set