{"id":29067,"date":"2023-06-14T14:44:53","date_gmt":"2023-06-14T14:44:53","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=29067"},"modified":"2023-06-14T14:44:56","modified_gmt":"2023-06-14T14:44:56","slug":"pinacolada","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pinacolada\/","title":{"rendered":"Pinacolada : Wireless Intrusion Detection System For Hak5&#8217;s WiFi Coconut"},"content":{"rendered":"\n<p><strong>Pinacolada <\/strong>is a<strong> <\/strong>Wireless Intrusion Detection System for Hak5&#8217;s WiFi Coconut.<\/p>\n\n\n\n<p>Pinacolada looks for typical IEEE 802.11 attacks and then informs you about them as quickly as possible. All this with the help of <a href=\"https:\/\/hak5.org\/products\/wifi-coconut\">Hak5&#8217;s WiFi Coconut<\/a>, which allows it to listen for threats on all 14 channels in the 2.4GHz range simultaneously.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/90N45-d3v\/Pinacolada#supported-80211-attacks\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Supported 802.11 Attacks<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Attack<\/th><th>Type<\/th><th>Status<\/th><\/tr><\/thead><tbody><tr><td>Deauthentication<\/td><td>DoS<\/td><td>\u2705<\/td><\/tr><tr><td>Disassociation<\/td><td>DoS<\/td><td>\u2705<\/td><\/tr><tr><td>Authentication<\/td><td>DoS<\/td><td>\u2705<\/td><\/tr><tr><td>EvilTwin<\/td><td>MiTM<\/td><td>????<\/td><\/tr><tr><td>KARMA<\/td><td>MiTM<\/td><td>????<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/90N45-d3v\/Pinacolada#dependencies\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dependencies<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/90N45-d3v\/Pinacolada#macos-with-pippython-and-homebrew-package-manager\"><\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>MacOS (With PIP\/Python and Homebrew package manager)<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code has-background\" style=\"background-color:#f4f4f4\"><code><strong>pip install flask\nbrew install wireshark<\/strong>\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/90N45-d3v\/Pinacolada#linux-with-pippython-and-apt-package-manager\"><\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Linux (With PIP\/Python and APT package manager)<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code has-background\" style=\"background-color:#f4f4f4\"><code><strong>pip install flask\napt install tshark<\/strong>\n<\/code><\/pre>\n\n\n\n<p>For both operating systems install the <a href=\"https:\/\/docs.hak5.org\/wifi-coconut\/software-and-drivers\/wifi-coconut-software\">WiFi Coconut&#8217;s userspace<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/90N45-d3v\/Pinacolada#installation\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Installation<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code has-background\" style=\"background-color:#f4f4f4\"><code><strong># Download Pinacolada\ngit clone https:\/\/github.com\/90N45-d3v\/Pinacolada\ncd Pinacolada\n\n# Start Pinacolada\npython main.py<\/strong>\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/90N45-d3v\/Pinacolada#usage\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Usage<\/strong><\/h3>\n\n\n\n<p>Pinacolada will be accessible from your browser at <code>127.0.0.1:8888<\/code>.<br>The default password is <code>CoconutsAreYummy<\/code>.<br>After you have logged in, you can see a dashboard on the start page and you should change the password in the settings tab.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/90N45-d3v\/Pinacolada#e-mail-notifications\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>E-Mail Notifications<\/strong><\/h3>\n\n\n\n<p>If configured, Pinacolada will alert you to attacks via E-Mail. In order to send you an E-Mail, however, an E-Mail account for Pinacolada must be specified in the settings tab. To find the necessary information such as SMTP server and SMTP port, search the internet for your mail provider and how their SMTP servers are configured + how to use them. Here are some information about known providers:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Provider<\/th><th>SMTP Server<\/th><th>SMTP Port (TLS)<\/th><\/tr><\/thead><tbody><tr><td>Gmail<\/td><td>smtp.gmail.com<\/td><td>587<\/td><\/tr><tr><td>Outlook<\/td><td>smtp.office365.com<\/td><td>587<\/td><\/tr><tr><td>GoDaddy<\/td><td>smtpout.secureserver.net<\/td><td>587<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/90N45-d3v\/Pinacolada#not-fully-tested\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Not fully tested!<\/strong><\/h3>\n\n\n\n<p>Since I don&#8217;t own a WiFi Coconut myself, I have to simulate their traffic. So if you encounter any problems, don&#8217;t hesitate to contact me and open an issue.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"\" target=\"_blank\" rel=\"noreferrer noopener\">Click Here To Download<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-background\" style=\"background-color:#f4f4f4\"><strong>Please consider&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/kali-linux-tutorials\/\" target=\"_blank\" rel=\"noreferrer noopener\">following and supporting<\/a>&nbsp;us to stay updated with the latest info<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pinacolada is a Wireless Intrusion Detection System for Hak5&#8217;s WiFi Coconut. Pinacolada looks for typical IEEE 802.11 attacks and then informs you about them as quickly as possible. All this with the help of Hak5&#8217;s WiFi Coconut, which allows it to listen for threats on all 14 channels in the 2.4GHz range simultaneously. Supported 802.11 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":29070,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5921,6038,6039],"class_list":["post-29067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-hak5","tag-pinacolada","tag-pinacolada-wireless-intrusion-detection-system-for-hak5s-wifi-coconut"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pinacolada : Wireless Intrusion Detection System For Hak5<\/title>\n<meta name=\"description\" content=\"Pinacolada is a Wireless Intrusion Detection System for Hak5&#039;s WiFi Coconut.Pinacolada looks for typical IEEE 802.11 attacks and then informs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pinacolada\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pinacolada : Wireless Intrusion Detection System For Hak5\" \/>\n<meta property=\"og:description\" content=\"Pinacolada is a Wireless Intrusion Detection System for Hak5&#039;s WiFi Coconut.Pinacolada looks for typical IEEE 802.11 attacks and then informs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pinacolada\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-14T14:44:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-14T14:44:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pinacolada\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pinacolada\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Pinacolada : Wireless Intrusion Detection System For Hak5&#8217;s WiFi Coconut\",\"datePublished\":\"2023-06-14T14:44:53+00:00\",\"dateModified\":\"2023-06-14T14:44:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pinacolada\/\"},\"wordCount\":283,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pinacolada\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png\",\"keywords\":[\"Hak5\",\"Pinacolada\",\"Pinacolada : Wireless Intrusion Detection System For Hak5&#039;s WiFi Coconut\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pinacolada\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pinacolada\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pinacolada\/\",\"name\":\"Pinacolada : Wireless Intrusion Detection System For Hak5\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pinacolada\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pinacolada\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png\",\"datePublished\":\"2023-06-14T14:44:53+00:00\",\"dateModified\":\"2023-06-14T14:44:56+00:00\",\"description\":\"Pinacolada is a Wireless Intrusion Detection System for Hak5's WiFi Coconut.Pinacolada looks for typical IEEE 802.11 attacks and then informs\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pinacolada\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pinacolada\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pinacolada : Wireless Intrusion Detection System For Hak5","description":"Pinacolada is a Wireless Intrusion Detection System for Hak5's WiFi Coconut.Pinacolada looks for typical IEEE 802.11 attacks and then informs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pinacolada\/","og_locale":"en_US","og_type":"article","og_title":"Pinacolada : Wireless Intrusion Detection System For Hak5","og_description":"Pinacolada is a Wireless Intrusion Detection System for Hak5's WiFi Coconut.Pinacolada looks for typical IEEE 802.11 attacks and then informs","og_url":"https:\/\/kalilinuxtutorials.com\/pinacolada\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-06-14T14:44:53+00:00","article_modified_time":"2023-06-14T14:44:56+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pinacolada\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pinacolada\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Pinacolada : Wireless Intrusion Detection System For Hak5&#8217;s WiFi Coconut","datePublished":"2023-06-14T14:44:53+00:00","dateModified":"2023-06-14T14:44:56+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pinacolada\/"},"wordCount":283,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pinacolada\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png","keywords":["Hak5","Pinacolada","Pinacolada : Wireless Intrusion Detection System For Hak5&#039;s WiFi Coconut"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/pinacolada\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pinacolada\/","url":"https:\/\/kalilinuxtutorials.com\/pinacolada\/","name":"Pinacolada : Wireless Intrusion Detection System For Hak5","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pinacolada\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pinacolada\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png","datePublished":"2023-06-14T14:44:53+00:00","dateModified":"2023-06-14T14:44:56+00:00","description":"Pinacolada is a Wireless Intrusion Detection System for Hak5's WiFi Coconut.Pinacolada looks for typical IEEE 802.11 attacks and then informs","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pinacolada\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pinacolada\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjASZFkmevkexro8ily78Q00OUQny2Q2lBPRpjj-uaiBJSbV2nBZTYVTWe5xhyqL6NxSl3MhzuSXjVcp9pMamAGOKuST7gGMCpICnUy7_SR9GfdIcR-F2vu_rbGvDqPdBH8a57hh7G9WAlUd5Ar2zkLbf4-8Gwe6EG2a2mseojvGviw1ce6_jFR8R4I\/s16000\/pinac.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":14812,"url":"https:\/\/kalilinuxtutorials.com\/redteam\/","url_meta":{"origin":29067,"position":0},"title":"Redteam-Hardware-Toolkit : Red Team Hardware Toolkit","author":"R K","date":"July 19, 2021","format":false,"excerpt":"Redteam should be formed with the intention of identifying and assessing vulnerabilities, testing assumptions, viewing alternate options for attack and revealing the limitations and security risks for that organization. There are many benefits to Red Teaming. First, you have a designated group with tactical experience in challenging the security of\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28524,"url":"https:\/\/kalilinuxtutorials.com\/powershell-backdoor-generator\/","url_meta":{"origin":29067,"position":1},"title":"Powershell-Backdoor-Generator : To Create A Flipper Zero\/ Hak5 USB Rubber Ducky Payload","author":"R K","date":"March 5, 2023","format":false,"excerpt":"Powershell-Backdoor-Generator is a reverse backdoor written in Powershell and obfuscated with Python. Allowing the backdoor to have a new signature after every build. With the capabilties to create a Flipper Zero\/ Hak5 USB Rubber ducky payload. usage: listen.py [-h] [--ip-address IP_ADDRESS] [--port PORT] [--random] [--out OUT] [--verbose] [--delay DELAY] [--flipper\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhpPclFTQvCgpPEm7vAjWQZFwUAIQqKDLn3Q2dvOnapF51bBSbEZMLa4gP4CmD1IOMbbOKMJInn3V7gUa_A6Pu4uO9mF8V_NjmtE7JOlVroE6vJCK3GGGoOuttuKF0gb9kuHHFfWaxEEcRAZjFaHR4lG6CYSaql3ROCsvPLNgx1tmO8oGIS7SKR4Nb5\/s16000\/preview.PNG?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhpPclFTQvCgpPEm7vAjWQZFwUAIQqKDLn3Q2dvOnapF51bBSbEZMLa4gP4CmD1IOMbbOKMJInn3V7gUa_A6Pu4uO9mF8V_NjmtE7JOlVroE6vJCK3GGGoOuttuKF0gb9kuHHFfWaxEEcRAZjFaHR4lG6CYSaql3ROCsvPLNgx1tmO8oGIS7SKR4Nb5\/s16000\/preview.PNG?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhpPclFTQvCgpPEm7vAjWQZFwUAIQqKDLn3Q2dvOnapF51bBSbEZMLa4gP4CmD1IOMbbOKMJInn3V7gUa_A6Pu4uO9mF8V_NjmtE7JOlVroE6vJCK3GGGoOuttuKF0gb9kuHHFfWaxEEcRAZjFaHR4lG6CYSaql3ROCsvPLNgx1tmO8oGIS7SKR4Nb5\/s16000\/preview.PNG?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhpPclFTQvCgpPEm7vAjWQZFwUAIQqKDLn3Q2dvOnapF51bBSbEZMLa4gP4CmD1IOMbbOKMJInn3V7gUa_A6Pu4uO9mF8V_NjmtE7JOlVroE6vJCK3GGGoOuttuKF0gb9kuHHFfWaxEEcRAZjFaHR4lG6CYSaql3ROCsvPLNgx1tmO8oGIS7SKR4Nb5\/s16000\/preview.PNG?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":30050,"url":"https:\/\/kalilinuxtutorials.com\/pineapple-mark-vii-rest-client\/","url_meta":{"origin":29067,"position":2},"title":"Pineapple Mark VII REST Client","author":"Varshini","date":"September 7, 2023","format":false,"excerpt":"The Pineapple Mark VII REST Client offers a robust suite of tools for WiFi penetration testing and security analysis. Developed by TW-D and compatible with Ruby, it allows users to automate both active and passive network attacks. With an extensive library of payloads, this toolkit identifies vulnerable devices, facilitates WiFi\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjG6zzp7trjCaBn6zzYPBD5Bi0FARsqTqtgEm4OusBM0Ftmndfz-vnCszW85G1r86Ki_e8pdOFawQVKoh38dUeSU-PFViU_yM2rHVZUlDMdHxbyWZYCqEiSBp82sFQ5bDk4JOKyOUQHMb7_8m4hcACuyfL9v0oxQQc0kJ9x6yIiDq2tVdERVA082VPPlA\/s16000\/Pineapple%20Mark%20VII%20REST%20Client.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjG6zzp7trjCaBn6zzYPBD5Bi0FARsqTqtgEm4OusBM0Ftmndfz-vnCszW85G1r86Ki_e8pdOFawQVKoh38dUeSU-PFViU_yM2rHVZUlDMdHxbyWZYCqEiSBp82sFQ5bDk4JOKyOUQHMb7_8m4hcACuyfL9v0oxQQc0kJ9x6yIiDq2tVdERVA082VPPlA\/s16000\/Pineapple%20Mark%20VII%20REST%20Client.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjG6zzp7trjCaBn6zzYPBD5Bi0FARsqTqtgEm4OusBM0Ftmndfz-vnCszW85G1r86Ki_e8pdOFawQVKoh38dUeSU-PFViU_yM2rHVZUlDMdHxbyWZYCqEiSBp82sFQ5bDk4JOKyOUQHMb7_8m4hcACuyfL9v0oxQQc0kJ9x6yIiDq2tVdERVA082VPPlA\/s16000\/Pineapple%20Mark%20VII%20REST%20Client.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjG6zzp7trjCaBn6zzYPBD5Bi0FARsqTqtgEm4OusBM0Ftmndfz-vnCszW85G1r86Ki_e8pdOFawQVKoh38dUeSU-PFViU_yM2rHVZUlDMdHxbyWZYCqEiSBp82sFQ5bDk4JOKyOUQHMb7_8m4hcACuyfL9v0oxQQc0kJ9x6yIiDq2tVdERVA082VPPlA\/s16000\/Pineapple%20Mark%20VII%20REST%20Client.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjG6zzp7trjCaBn6zzYPBD5Bi0FARsqTqtgEm4OusBM0Ftmndfz-vnCszW85G1r86Ki_e8pdOFawQVKoh38dUeSU-PFViU_yM2rHVZUlDMdHxbyWZYCqEiSBp82sFQ5bDk4JOKyOUQHMb7_8m4hcACuyfL9v0oxQQc0kJ9x6yIiDq2tVdERVA082VPPlA\/s16000\/Pineapple%20Mark%20VII%20REST%20Client.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjG6zzp7trjCaBn6zzYPBD5Bi0FARsqTqtgEm4OusBM0Ftmndfz-vnCszW85G1r86Ki_e8pdOFawQVKoh38dUeSU-PFViU_yM2rHVZUlDMdHxbyWZYCqEiSBp82sFQ5bDk4JOKyOUQHMb7_8m4hcACuyfL9v0oxQQc0kJ9x6yIiDq2tVdERVA082VPPlA\/s16000\/Pineapple%20Mark%20VII%20REST%20Client.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":649,"url":"https:\/\/kalilinuxtutorials.com\/mdk3\/","url_meta":{"origin":29067,"position":3},"title":"WiFi Stress Testing Using MDK3, Beacon Flooding &#038; Deauthentication Attack.","author":"Ravi Sankar","date":"June 13, 2018","format":false,"excerpt":"MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi). It consists of various methods by which we can perform tests. Some of major method sare beacon flooding, deauthentication, WPA- dos etc. In pentests mdk is used for testing the network infrastructures having 802.11 implementations\u2026","rel":"","context":"In &quot;Stress Testing&quot;","block_context":{"text":"Stress Testing","link":"https:\/\/kalilinuxtutorials.com\/category\/st\/"},"img":{"alt_text":"","src":"https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=350%2C200 1x, https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=525%2C300 1.5x, https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=700%2C400 2x, https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=1050%2C600 3x, https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=1400%2C800 4x"},"classes":[]},{"id":28659,"url":"https:\/\/kalilinuxtutorials.com\/redteam-physical-tools\/","url_meta":{"origin":29067,"position":4},"title":"RedTeam-Physical-Tools : Red Team Toolkit Used In The Field For Physical Security, Red Teaming, And Tactical Covert Entry","author":"R K","date":"March 28, 2023","format":false,"excerpt":"Red Team Toolkit is a curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry. Red Team - Physical Security - Covert Entry - EDC Disclaimer: I am not responsible for anyone using any information in this post for any\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBM6RmAoe5dOrJYNwxRuN80W7Us2W3duLVx_kZWqcj1CkjCcSLfjas9TZuH4KH_lSmjQaGqhneFolkmSNaZ-R-rGWeZJIEexzu5ABFHPrPnT1lhYbTZtlKtYm4iv7kiPG_mzUD1bT0DRDv6XCgSiUeMd9HhnDEO5F87bGA4tkAV9ebMhL0K9FDYgo5\/s16000\/169399280-7c6c7317-f41a-4083-9331-ab569e5fd252.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBM6RmAoe5dOrJYNwxRuN80W7Us2W3duLVx_kZWqcj1CkjCcSLfjas9TZuH4KH_lSmjQaGqhneFolkmSNaZ-R-rGWeZJIEexzu5ABFHPrPnT1lhYbTZtlKtYm4iv7kiPG_mzUD1bT0DRDv6XCgSiUeMd9HhnDEO5F87bGA4tkAV9ebMhL0K9FDYgo5\/s16000\/169399280-7c6c7317-f41a-4083-9331-ab569e5fd252.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBM6RmAoe5dOrJYNwxRuN80W7Us2W3duLVx_kZWqcj1CkjCcSLfjas9TZuH4KH_lSmjQaGqhneFolkmSNaZ-R-rGWeZJIEexzu5ABFHPrPnT1lhYbTZtlKtYm4iv7kiPG_mzUD1bT0DRDv6XCgSiUeMd9HhnDEO5F87bGA4tkAV9ebMhL0K9FDYgo5\/s16000\/169399280-7c6c7317-f41a-4083-9331-ab569e5fd252.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBM6RmAoe5dOrJYNwxRuN80W7Us2W3duLVx_kZWqcj1CkjCcSLfjas9TZuH4KH_lSmjQaGqhneFolkmSNaZ-R-rGWeZJIEexzu5ABFHPrPnT1lhYbTZtlKtYm4iv7kiPG_mzUD1bT0DRDv6XCgSiUeMd9HhnDEO5F87bGA4tkAV9ebMhL0K9FDYgo5\/s16000\/169399280-7c6c7317-f41a-4083-9331-ab569e5fd252.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3006,"url":"https:\/\/kalilinuxtutorials.com\/digiduck-framework\/","url_meta":{"origin":29067,"position":5},"title":"DigiDuck &#8211; Framework for Digiduck Development Boards Running ATTiny85 Processors &#038; Micronucleus Bootloader","author":"R K","date":"October 18, 2018","format":false,"excerpt":"Framework for Digiduck Development Boards running ATTiny85 processors and micronucleus bootloader! DigiDuck Installation DigiDuck Framework (Referred to as DDF) is really simple to start and setup! There are no third party modules required for DDF! All you need to do is make sure you have Python 3.6+ (I used this\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/DigiDuck1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/DigiDuck1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/DigiDuck1.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=29067"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29067\/revisions"}],"predecessor-version":[{"id":29071,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29067\/revisions\/29071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/29070"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=29067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=29067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=29067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}