PINEAPPLE MK7 REST CLIENT is a leading rogue access point and WiFi pentest toolkit for close access operations. It is also a passive and active attacks analyze vulnerable and mis-configured devices.
Usage
system = PineappleMK7::System.new()
system.host = (string) “172.16.42.1”
system.host()
system.port = (string) “1471”
system.port()
system.mac = (string) “00:13:37:DD:EE:FF”
system.mac()
system.password = (string) “P@55w0rD”
system.login()
host(), port() and mac() accessors return string
login() method return boolean
Modules
recon = PineappleMK7::Modules::Recon
recon.startScan( (integer) time )
recon.getResults( (integer) scanID )
recon.deleteScan( (integer) scanID )
startScan method have scanID() submethod and return integer
getResults method have APResults(), UnassociatedClientResults() and OutOfRangeClientResults() submethods
APResults() submethod return array of objects where object have :
ssid()
bssid()
encryption()
hidden()
wps()
channel()
signal()
clients() -> client_mac(), ap_mac() and ap_channel()
UnassociatedClientResults() submethod return array of objects where object have :
client_mac()
ap_mac()
ap_channel()
OutOfRangeClientResults() submethod return array of objects where object have :
client_mac()
ap_mac()
ap_channel()
pineAP = PineappleMK7::Modules::PineAP
pineAP.enable()
pineAP.startHandshakesCapture( (hash/object) ap )
pineAP.deauthAP( (string) bssid, (integer) channel, (array) clients )
pineAP.deauthClient( (string) bssid, (integer) channel, (string) mac )
pineAP.stopHandshakesCapture()
pineAP.getHandshakes()
pineAP.filterClient( (string “allow” or “deny”) mode )
pineAP.filterSSID( (string “allow” or “deny”) mode )
pineAP.addSSID( (string) ssid )
pineAP.clearPool()
pineAP.setRogue()
pineAP.getClients()
pineAP.disable()
getHandshakes() method have handshakes() submethod return array of objects where object have :
type()
bssid()
getClients() method return array of objects where object have :
mac()
ip()
hostname()
ssid()
tx_bytes()
rx_bytes()
notifications = PineappleMK7::Modules::Notifications
notifications.clearAll()
download = PineappleMK7::Modules::Download
download.handshake( (string) bssid, (string) type, (string) destination )
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…