Introduction to Payloads
This section of the manual is being updated, expect more information about payload creation and Pineapple DuckyScript Commands soon!
The WiFi Pineapple Pager is expandable via the payload system.
Payloads are scripts integrated with DuckyScript commands which leverage the power of the WiFi Pineapple system.
DuckyScript is the payload language of Hak5 gear.
Originating on the Hak5 USB Rubber Ducky as a standalone language, the Packet Squirrel uses DuckyScript commands to bring the ethos of easy-to-use actions to the payload language.
DuckyScript commands are always in all capital letters to distinguish them from other system or script language commands. Typically, they take a small number of options (or sometimes no options at all).
Payloads can be constructed of DuckyScript commands alone, or combined with the power of bash scripting and system commands to create fully custom, advanced actions.
Payloads
The Pager uses three types of payloads:
Alert payloads
Alert payloads are small, typically non-interactive scripts launched in response to conditions in the environment. Alert payloads can take simple actions like displaying a message, playing a ringtone,
Alert payloads can be run for various conditions which can happen at any time while the Pineapple is operating:
- WPA handshake capture
- Wi-Fi Denial of Service attacks
- A client connecting to a Pineapple access point
- Authentication details captured by a Pineapple access point
Alert payloads can be run at any time when background events occur; they should be slim and minimal, as they may be launched repeatedly.
User payloads
User payloads are the fully-featured big brother to Alert payloads.
User payloads are run by the user from the Payload section of the main device dashboard.
User payloads expose the full range of Pineapple DuckyScript commands, which lets developers construct user interactions for entering text, IP addresses, MAC addresses, confirming actions, displaying logs and status results, and more.
Recon payloads
Recon payloads are run against access points and clients discovered by the recon process.
Recon payloads also utilize the full range of Pineapple DuckyScript commands and user interactions.
Already familiar with DuckyScript commands? Please keep reading!
The DuckyScript ecosystem strives to bring common commands to the entire line of Hak5 products, however commands unique to each product will not work on other devices. Payloads may look similar, but not all commands will be available on all devices (The WiFi Pineapple Pager is not a keyboard injection device, for instance, so inject commands from the USB Rubber Ducky will not work).
Payload repository
The official Hak5 payload repository is available at https://github.com/hak5/wifipineapplepager-payloads/tree/master
This includes Hak5 example scripts and community contributed payloads.
Payloads in the repository are organized into alert, recon, and user, with further sub-categories.
Payloads from the Payload Repository are provided for educational purposes only. Hak5 gear is intended for authorized auditing and security analysis purposes only where permitted subject to local and international laws where applicable. Users are solely responsible for compliance with all laws of their locality. Hak5 LLC and affiliates claim no responsibility for unauthorized or unlawful use.
While Hak5 audits payloads before they are accepted into the payload repository, use of third party payloads is at your own risk.