Jump to content

wutanglan

Active Members
  • Posts

    6
  • Joined

  • Last visited

Posts posted by wutanglan

  1. If this machine has modern Windows packages, I would bet my life the above file that gets extracted will be detected by an AV solution. There are ways to attempt to make it undetected which you can look into. I recommend Georgia Weidman's book: "Penetration Testing: A hands on Introduction to hacking" for further info. She covers the whole process of using metasploit in a fundamental way and bypassing AV, and also how it's done. I would look into more in WHY these exploits / payloads work instead of how to reach a specific goal. Also, in order for you to access the target machine, you will need to setup a listener on your own machine. 

     

     

     

  2. Well, the 172.16.84.1 interface would not be available because there is no interface to connect to if it's just a power source as this interface relies on a physical interface to attach to. As for the 192.168.x.x failing, did you set this statically ? It's possible the ip changed. 

    Try doing a ping sweep of your LAN to ensure it is reachable - `nmap -sS -p 22 --open 192.168.178.1/4`

  3. So if I understand correctly, you have the LT plugged into a laptop which has the internal 172.16.84.1 address and also into the LAN which received the 192.168.178.31/24 address correct ? 

    * From here, you mention that you plug it through a direct power source ? 

    What I get from here is that the 172.16.84.1/24 scheme is not accessible because the interface it is responsible for connecting to when plugged into a device through USB is not accessible as it's just a power source. 

    You should technically still have a LAN connection, however. 

    Also, if you're looking to access the turtle remotely you will want to look into setting up the Open VPN server either at your home on a Raspberry PI or on a router / networking device if it supports it. Hope I understood your hang ups here. 

     

×
×
  • Create New...