Shad Posted September 2, 2015 Share Posted September 2, 2015 (edited) Hi! This will be the discussion/support thread for TORtle module. I sent the pull request several days ago but as I don't know when it will pushed I decided to open the thread already and attach the file just in case anyone wants to try it. First, what is TORtle? It's bassically a module that combines TOR and LAN Turtle in an automatic convenient way. It does two main things: 1- TORShell: Sets up a hidden service inside TOR network. By default it is a TORShell (SSH within TOR), that is a redirection to local port 22 (ssh)... but you can configure to offer any service you want. This offers another possibility of remote shell WITHOUT requiring any sort of proxy/host pivoting or reverse connection to your machine. LAN Turtle has lots of reverse shell options, which is cool, but having the possibility of direct/arbitrary/anonymous direct shells might be handy in some usage cases. TORShell offers just another one of those options. Also you can use it to host an httpd server (or any other service) inside TOR if you want. For example: My Turtle has a web server at: securityfrod4xaa.onion (or https://securityfrod4xaa.onion.to if connecting from "regular" internet). Of course all of this is provided by the openwrt 'tor' client, TORtle just takes care of automagically setting it all up for you. 2- TORGateway: If enabled, automatically and conveniently forwards all ETH0 traffic through a TOR Transparent Proxy. It's a very simple way make all the connectivity for the USB connected PC go through TOR, simply starting the service with that configuration and not having to do anything else on the PC. TORtle will take care of all the necessary redirections for you. Also, another option is to just run the regular TOR Proxy, for which you can also enable/disable turtle's IP forwarding for added prevention against unintentional leaks. All of this you can choose in the simple configuration screen. I also think that this could be a good place to discuss what are the best/more secure ways to access the TOR network. Ie: The risks of DNS leaking, other spyware inadvertently leaking when forwarding ALL traffic, if it is prefereable to use torified applications with a regular TOR proxy instead a full gateway, etc... And also, any bugs or ideas to improve TORtle are very much welcome. I *really* need your feedback. Thanks! P.D.: I don't see the file I attached to my post... anyway, you can download it from https://securityfrod4xaa.onion.to/tortle Just place it on /etc/turtle/modules and you are all set to use it from 'turtle' menu. - Shad. Edited September 2, 2015 by Shad 2 Quote Link to comment Share on other sites More sharing options...
Darren Kitchen Posted September 9, 2015 Share Posted September 9, 2015 The TORtle module has been added to the repo. Thanks! 1 Quote Link to comment Share on other sites More sharing options...
Shad Posted September 24, 2015 Author Share Posted September 24, 2015 Thanks Darren! Let's see if anyone tries it AND post some feedback about it. Otherwise I will just leave it as it is, as it currently does everything I needed for my usage case. Quote Link to comment Share on other sites More sharing options...
V3RT!90 Posted November 19, 2015 Share Posted November 19, 2015 So how do i access the turtle over ssh? 1 Quote Link to comment Share on other sites More sharing options...
m40295 Posted November 26, 2015 Share Posted November 26, 2015 I like this module tho I am having issues with connecting thru ssh service aswell Quote Link to comment Share on other sites More sharing options...
cyb3rwr3ck Posted February 9, 2016 Share Posted February 9, 2016 Hey Shad, thanks for the great module it works perfectly for connecting back in using the hidden-service! Wouldn't it be cool to have pluggable transports included to hide the TOR traffic from DPI ans so forth? I am unfortunatly not aware if this would be possible with the hidden service... Best regards! 1 Quote Link to comment Share on other sites More sharing options...
GermanNoob Posted March 8, 2017 Share Posted March 8, 2017 @Shad As it seemed, that you aren't anymore active on this module, I forked it and did some changes: - added a submenu to the configuration - added tor bridges - added http & httpsproxy - added FascistFirewall @cyb3rwr3ck Does this fullfill your request? @all: This version needs to be tested, so feel free to get it here: https://github.com/GermanNoob/tortle @Darren Kitchen What steps do I have to take to get the version added to the repo (after it is tested of course)? Quote Link to comment Share on other sites More sharing options...
cyb3rwr3ck Posted August 21, 2017 Share Posted August 21, 2017 (edited) Sorry for the late reply! Actually what I was looking for was the integration of pluggable transports (https://www.torproject.org/docs/pluggable-transports.html.en#user) which should hide the traffic for all kinds of deep-packets-inspection. Bridges are also good, but as far as I understand your code only uses 'standard' tor connections. The perfect combination would be bridges+PT (https://www.torproject.org/docs/bridges#PluggableTransports) to cicumvent DPI and statically blocked entry-guards. I will try to add the PT support asap. EDIT: I recognized that you also use obfs3. I will give it a try. Edited August 21, 2017 by cyb3rwr3ck recognized i was wrong Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.