Pineapple MK7 REST Client : WiFi Hacking Workflow With Pineapple Mark 7 API

PINEAPPLE MK7 REST CLIENT is a leading rogue access point and WiFi pentest toolkit for close access operations. It is also a passive and active attacks analyze vulnerable and mis-configured devices.

Usage

  • See/edit/execute the files in the samples/ folder
  • System Authentication accessors/method

system = PineappleMK7::System.new()

system.host = (string) “172.16.42.1”
system.host()
system.port = (string) “1471”
system.port()
system.mac = (string) “00:13:37:DD:EE:FF”
system.mac()
system.password = (string) “P@55w0rD”
system.login()

host(), port() and mac() accessors return string

login() method return boolean

Modules

  • Module Recon methods

recon = PineappleMK7::Modules::Recon

recon.startScan( (integer) time )
recon.getResults( (integer) scanID )
recon.deleteScan( (integer) scanID )

startScan method have scanID() submethod and return integer

getResults method have APResults(), UnassociatedClientResults() and OutOfRangeClientResults() submethods

APResults() submethod return array of objects where object have :

ssid()
bssid()
encryption()
hidden()
wps()
channel()
signal()
clients() -> client_mac(), ap_mac() and ap_channel()

UnassociatedClientResults() submethod return array of objects where object have :

client_mac()
ap_mac()
ap_channel()

OutOfRangeClientResults() submethod return array of objects where object have :

client_mac()
ap_mac()
ap_channel()

  • Module PineAP methods

pineAP = PineappleMK7::Modules::PineAP

pineAP.enable()
pineAP.startHandshakesCapture( (hash/object) ap )
pineAP.deauthAP( (string) bssid, (integer) channel, (array) clients )
pineAP.deauthClient( (string) bssid, (integer) channel, (string) mac )
pineAP.stopHandshakesCapture()
pineAP.getHandshakes()
pineAP.filterClient( (string “allow” or “deny”) mode )
pineAP.filterSSID( (string “allow” or “deny”) mode )
pineAP.addSSID( (string) ssid )
pineAP.clearPool()
pineAP.setRogue()
pineAP.getClients()
pineAP.disable()

getHandshakes() method have handshakes() submethod return array of objects where object have :

type()
bssid()

getClients() method return array of objects where object have :

mac()
ip()
hostname()
ssid()
tx_bytes()
rx_bytes()

  • Module Notifications method

notifications = PineappleMK7::Modules::Notifications

notifications.clearAll()

  • Module Download method

download = PineappleMK7::Modules::Download

download.handshake( (string) bssid, (string) type, (string) destination )

R K

Recent Posts

Starship : Revolutionizing Terminal Experiences Across Shells

Starship is a powerful, minimal, and highly customizable cross-shell prompt designed to enhance the terminal…

14 hours ago

Lemmy : A Decentralized Link Aggregator And Forum For The Fediverse

Lemmy is an innovative, open-source platform designed for link aggregation and discussion, providing a decentralized…

14 hours ago

Massive UX Improvements, Custom Disassemblers, And MSVC Support In ImHex v1.37.0

The latest release of ImHex v1.37.0 introduces a host of exciting features and improvements, enhancing…

16 hours ago

Ghauri : A Powerful SQL Injection Detection And Exploitation Tool

Ghauri is a cutting-edge, cross-platform tool designed to automate the detection and exploitation of SQL…

19 hours ago

Writing Tools : Revolutionizing The Art Of Writing

Writing tools have become indispensable for individuals looking to enhance their writing efficiency, accuracy, and…

19 hours ago

PatchWerk : A Tool For Cleaning NTDLL Syscall Stubs

PatchWerk is a proof-of-concept (PoC) tool designed to clean NTDLL syscall stubs by patching syscall…

2 days ago