Pina Colada Is a Network Security Hacking Tool

Network security experts have developed the Pina Colada security application which is a powerful wireless drop box which can be used to carry out remote attacks.

The Pina Colada Security Tool is Useful For Offensive Network Attacks

The Pina Colada network security utility is an extensive wireless drop box which can be used to carry out offensive attacks on target networks. This is newly devised application that can be controlled using a command line interface. The developers are going to add a new C&C remote malicious server functionality soon. The creators have also devised an Android application which allows the users to operate the server.

____ _ /\// ______ __ __ ‘ .
/ __ \(_)//\/ ____ _ / ____/___ / /___ _____/ /___ _ \~~~/
/ /_/ / / __ \/ __ `/ / / / __ \/ / __ `/ __ / __ `/ \_/
/ ____/ / / / / /_/ / / /___/ /_/ / / /_/ / /_/ / /_/ / Y
/_/ /_/_/ /_/\__,_/ \____/\____/_/\__,_/\__,_/\__,_/ _|_
Welcome to Pina Colada, a powerful Wifi Drop Box. Type “help” to see the list of available commands.
>>

The utility comes with a large number of built-in features which allows its operators to carry out different attacks and operations and more capabilities can be added at any time. Its “capabilities” are modules that can be dynamically altered and added to the program. Its controls are very similar to the Metasploit framework which is popular among both security experts and computer hackers.

At the moment the dependency of the project is Scapy which is described as a powerful interactive packet manipulation program. In the future an automatic deployment package is going to be released.

There a number of commands that can be used to execute various network actions – use of promiscious mode, controlling of the operating network interface, network enumeration, and commands execution.

The out of the box capabilities of Pina Colada include the following:

  • Denial of Service Attacks (DOS) – Via syn, land or tcpkiller attacks
  • ARP Attacks – ARP Spoofing and ARP DOS attacks
  • Packet Sniffing
  • Exploits – Using the dnsSpoof2, ms08 and dnsSpoof modes
  • Network Scanning – using syn packets and nmap
  • Auxiliary Attacks

All modules of Pina Colada are persistent when they are loaded into the program. This allows for multiple modules to be launched at the same time. The Pina Colada’s remote C&C server has been demonstrated to run on a Raspberry Pi. Which allows for encrypted communications and prevents eavesdropping or Man-in-the-middle attacks.

For more information about the utility you can view the project’s GitHub page.

How disturbing is this problem?

Avatar

Author : Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.


Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *