Pineapple MK7 REST Client | WiFi Hacking Workflow With Pineapple Mark 7 API

image

PINEAPPLE MARK VII REST CLIENT

  • The leading rogue access point and WiFi pentest toolkit for close access operations.
  • Passive and active attacks analyze vulnerable and misconfigured devices.
  • @HAK5

Author:: TW-D

Version:: 1.1.3

Copyright:: Copyright (c) 2021 TW-D

License:: Distributes under the same terms as Ruby

Doc:: https://docs.hak5.org/hc/en-us/articles/360049854174-WiFi-Pineapple-Mark-VII-REST-API

Requires:: ruby >= 2.7.0, rest-client 2.1.0 gem, net-ssh 6.1.0 gem and Pineapple Mark VII Firmware <= 1.0.2-stable

Installation::

  • sudo apt-get install ruby ruby-dev
  • sudo gem install rest-client net-ssh

Usage

See/edit/execute the files in the samples/ folder

recon-v1.0.4.png

System Authentication accessors/method

system = PineappleMK7::System.new()

system.host = (string) "172.16.42.1"
system.host()
system.port = (string) "1471"
system.port()
system.mac = (string) "00:13:37:DD:EE:FF"
system.mac()
system.password = (string) "[email protected]"
system.login()

host(), port() and mac() accessors return string

login() method return boolean

System LED methods

system.setup() # Magenta solid system.failed() # Red slow blink system.attack() # Yellow single blink system.special() # Cyan inverted single blink system.cleanup() # White fast blink system.finish() # Green very fast blink followed by SOLID system.off() # Turns the LED off

Modules

Module Recon methods

recon = PineappleMK7::Modules::Recon

recon.startScan( (integer) seconds )    # 0 = Continuous
recon.stopScan()
recon.getResults( (integer) scanID )
recon.convertEncryption( (integer) encryption() )
recon.deleteScan( (integer) scanID )

startScan method have scanID() submethod and return integer

getResults method have APResults(), UnassociatedClientResults() and OutOfRangeClientResults() submethods

APResults() submethod return array of objects where object have :

ssid()
bssid()
encryption()    # return bitmask
hidden()
wps()
channel()
signal()
clients() -> client_mac(), ap_mac() and ap_channel()

UnassociatedClientResults() submethod return array of objects where object have :

client_mac()
ap_mac()
ap_channel()

OutOfRangeClientResults() submethod return array of objects where object have :

client_mac()
ap_mac()
ap_channel()

Module PineAP methods

pineAP = PineappleMK7::Modules::PineAP

# Clients
pineAP.getClients()

# Deauth
pineAP.deauthAP( (string) bssid, (integer) channel, (array) clients )
pineAP.deauthClient( (string) bssid, (integer) channel, (string) mac )

# Filters
pineAP.filterClient( (string "allow" or "deny") mode )
pineAP.filterSSID( (string "allow" or "deny") mode )

# Handshakes
pineAP.startHandshakesCapture( (hash/object) ap )
pineAP.getHandshakes()
pineAP.stopHandshakesCapture()

# Logging
pineAP.clearActivity()

# Settings
pineAP.enable()
pineAP.setRogue()
pineAP.disable()

# SSIDs
pineAP.addSSID( (string) ssid )
pineAP.clearPool()

getHandshakes() method have handshakes() submethod return array of objects where object have :

type()
bssid()

getClients() method return array of objects where object have :

mac()
ip()
hostname()
ssid()
tx_bytes()
rx_bytes()

Module Notifications method

notifications = PineappleMK7::Modules::Notifications

notifications.clearAll()

Module Download method

download = PineappleMK7::Modules::Download

download.handshake( (string) bssid, (string) type(), (string) destination )

Module Helpers method

helpers = PineappleMK7::Modules::Helpers

lookupOUI( (string) mac ) method return object with :

available()
vendor()

GitHub:

3 Likes
Friendly Websites

https://igg-games.com/ https://pcgamestorrents.com/ https://pirateiro.com/ ettvdl.com https://dodi-repacks.site/ https://crackingpatching.com/ https://glodls.to/ https://prostylex.org/ https://haxnode.com/ https://freedownloadae.com/ https://www.novahax.com/ https://www.sadeempc.com/ freecoursesonline.me ftuapps.dev