Difference between revisions of "Hak5 LAN Turtle"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 22: Line 22:
# Start by plugging the turtle into a controlled computer.
# Start by plugging the turtle into a controlled computer.
# Your computer will get an 172.16.84.x address as soon as the startup sequence of the turtle finished
# Your computer will get an 172.16.84.x address as soon as the startup sequence of the turtle finished
# Connect to it with <code>ssh root@172.16.84.1</code> and enter the password <sh3lls>
# Connect to it with <code>ssh root@172.16.84.1</code> and enter the password <code>sh3lls</code>
# The
# The simplistic graphical shell interface will prompt you to change the password but the old one is also allowed.
 
# Then the LAN turtle can be configured and modules can be installed in the interface.
# If you end the interface you will be greeted with an normal Linux shell but you can open it again with the <code>turtle command</code>
=== Step 2 ===
=== Step 2 ===
Make sure to read
* War and Peace
* Lord of the Rings
* The Baroque Cycle


== Used Hardware ==
== Used Hardware ==

Revision as of 14:57, 2 June 2020

Summary

The Lan turtle is an tool for Penetration testers and Systems Admins disguised as an simple USB Ethernet adapter.

Use Cases

The use cases may differ between the user gougps.

Penetration users can use it for:

  • Network scanner with nmap
  • DNS spoofing clients
  • Monitoring Browser Connections

Sysadmin my us it for:

  • Access the LAN from an remote location with an VPN tunnel
  • sending status reports via email or https periodically

Description

Setting up the LAN Turtle

  1. Start by plugging the turtle into a controlled computer.
  2. Your computer will get an 172.16.84.x address as soon as the startup sequence of the turtle finished
  3. Connect to it with ssh root@172.16.84.1 and enter the password sh3lls
  4. The simplistic graphical shell interface will prompt you to change the password but the old one is also allowed.
  5. Then the LAN turtle can be configured and modules can be installed in the interface.
  6. If you end the interface you will be greeted with an normal Linux shell but you can open it again with the turtle command

Step 2

Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

References