Network security experts have developed the Pina Colada security application which is a powerful wireless drop box which can be used to carry out remote attacks.
The Pina Colada Security Tool is Useful For Offensive Network Attacks
The Pina Colada network security utility is an extensive wireless drop box which can be used to carry out offensive attacks on target networks. This is newly devised application that can be controlled using a command line interface. The developers are going to add a new C&C remote malicious server functionality soon. The creators have also devised an Android application which allows the users to operate the server.
____ _ /\// ______ __ __ ‘ .
/ __ \(_)//\/ ____ _ / ____/___ / /___ _____/ /___ _ \~~~/
/ /_/ / / __ \/ __ `/ / / / __ \/ / __ `/ __ / __ `/ \_/
/ ____/ / / / / /_/ / / /___/ /_/ / / /_/ / /_/ / /_/ / Y
/_/ /_/_/ /_/\__,_/ \____/\____/_/\__,_/\__,_/\__,_/ _|_
Welcome to Pina Colada, a powerful Wifi Drop Box. Type “help” to see the list of available commands.
The utility comes with a large number of built-in features which allows its operators to carry out different attacks and operations and more capabilities can be added at any time. Its “capabilities” are modules that can be dynamically altered and added to the program. Its controls are very similar to the Metasploit framework which is popular among both security experts and computer hackers.
At the moment the dependency of the project is Scapy which is described as a powerful interactive packet manipulation program. In the future an automatic deployment package is going to be released.
There a number of commands that can be used to execute various network actions – use of promiscious mode, controlling of the operating network interface, network enumeration, and commands execution.
The out of the box capabilities of Pina Colada include the following:
- Denial of Service Attacks (DOS) – Via syn, land or tcpkiller attacks
- ARP Attacks – ARP Spoofing and ARP DOS attacks
- Packet Sniffing
- Exploits – Using the dnsSpoof2, ms08 and dnsSpoof modes
- Network Scanning – using syn packets and nmap
- Auxiliary Attacks
All modules of Pina Colada are persistent when they are loaded into the program. This allows for multiple modules to be launched at the same time. The Pina Colada’s remote C&C server has been demonstrated to run on a Raspberry Pi. Which allows for encrypted communications and prevents eavesdropping or Man-in-the-middle attacks.
For more information about the utility you can view the project’s GitHub page.