Skip to content

Latest commit

 

History

History
58 lines (47 loc) · 2.42 KB

README.md

File metadata and controls

58 lines (47 loc) · 2.42 KB

wifi-pineapple-berserker

Brute force your Wifi Pineapple Mk. 7 Handshake Workflow!

Author: salt-or-ester (geek with a cold heart)

Source: https://gitgud.io/saltorester/wifi-pineapple-berserker/

___.                                          __                    ._.._.._.
\_ |__    ____ _______  ______  ____ _______ |  | __  ____ _______  | || || |
 | __ \ _/ __ \\_  __ \/  ___/_/ __ \\_  __ \|  |/ /_/ __ \\_  __ \ | || || |
 | \_\ \\  ___/ |  | \/\___ \ \  ___/ |  | \/|    < \  ___/ |  | \/  \| \| \|
 |___  / \___  >|__|  /____  > \___  >|__|   |__|_ \ \___  >|__|     __ __ __
     \/      \/            \/      \/             \/     \/          \/ \/ \/
   
                                                                               

This simple python script is an aggressive handshake brute-forcer for the Hak Wifi Pineapple Mark VII to fully automate your recon, de-authing and handshake capturing. Turn this thing on, take your Pineapple for a walk around town, and collect handshakes without any effort.

Requirements:

python3
- requests library

Install:

pip install -r requirements.txt

Use:

Run on your local machine, not the Wifi Pineapple (better performance)
- Edit berserker.py
- Modify "config" to match the pineapple server, port, username, password, etc
- python3 berserker.py

Workflow:

This is the workflow the script performs:
- set pineAP settings to AGGRESSIVE, broadcasting, allowing connections, auto-restart, etc
- run recon for 90 seconds, identify all APs with associated clients
- start handshake capture
- de-auth all clients related to AP, repeat 20 seconds later; total 2 mins
- handshakes captured, available for use
- repeat: move to next AP with associated clients, de-auth, etc.

Captures

The script output will tell you when a capture is collected, but many like to run this over
an extended time (ie: overnight), so just take a look in the Pineapple UI or your handshake 
directory and you'll see everything that was collected.  By default it's in /root/handshakes 
on the Wifi Pineapple device.