Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'lan'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple / Jasager
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • Mark V
    • Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • Mark I, II, III
  • Active Projects
    • Bash Bunny
    • Packet Squirrel
    • Lan Turtle
    • USB Rubber Ducky
    • SDR - Software Defined Radio
    • Community Projects
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Other Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Found 8 results

  1. Hello guys. So I have just followed this guide to set up my lan turtle over wifi so I don't need to plug it into the ethernet to set it up/update/etc https://www.youtube.com/watch?v=11qAQ3X71X0 I do this on my Kali machine (So I can open up the turtle.sh file) I follow all the steps... it works fine... I can even ping google... But as soon as i unplug the Turtle, and plug it into my Windows PC... All that change and config gets deleted.... I cant access the turtle.sh to set it up on my windows PC either because you cant open bash scripts in powershell And now when I RE-PLUG it back into my Kali to do all the ./turtle.sh again... It wont ping google now??? I follow the step by step, run the bash file... Set up my default gateway... And then when its all done and says "happy shelling" it no longer pings google???? Do I need to do a hard reset?
  2. No SSH when plugged into regular LAN?

    Hi, I went through the initial setup by connecting my Turtle to my laptop and updating to the latest version (per ).%C2'> Once I reset the password for the SSH connection, I disconnected the Turtle from my laptop and connected it directly to my LAN switch. I can see the device come up and pull a DHCP address, and I can ping it just fine, but ALL ports are closed - no SSH for me. Once I reconnect to my laptop to get the 172.16.84.x address, I'm back in business. I must be missing something - maybe I need to configure one of the modules differently or something? F
  3. MITM victim in the network

    Hallo, I have one question about the Lan Turtle. When i connect the Lan turtle in a PC from a "big" network so the lan turtle has acces to the network, doesnt it? When i want to start a MITM attack, have the target device only be in the same network or should i connect the lan turtle directly to the targetet device? So for example i plug in the lan turtle in "PC206" and i want to attack the "PC259" does it works or should i plug in the turtle in PC259? I Hope you understand my question :) Thanks in advice, Simon PS: sorry for my bad englisch, im not a native speaker
  4. Steal Passwords from network

    Hello, We all know thats is easily possible to steal login datas from logged PC`s using the Lan Turtle. But whould this work also in a network? So i connect the Lan turtle with a Lancable to the network and not directly to a PC? I hope you can answer my question :) Thanks in advice, Simon Sorry for my bad englisch :/
  5. Hi, I did a pentest in a LAN, some weird things happened. This LAN is a little unusual, there are two routers, say A and B, A is directly connected to an optical fiber, doing PPPoE, to the WAN, it has a gateway of 192.168.1.1, B is connected to A, wireless router, with a gateway of 192.168.0.1. All the clients and my Kali machine are connected to B. Target has an IP of 192.168.0.104 Here is what I did with Kali, I use the following to arp spoof the target and router B arpsoof -i eth0 -t 192.168.0.1 192.168.0.104 arpsoof -i eth0 -t 192.168.0.104 192.168.0.1 sysctl -w net.ipv4.ip_forward=1 Then I did a Dns Spoof with dnsspoof -i eth0 -f dnshost.spoof It did not work, all the traffic went through my Kali, but the target was still able to access the original webpage. And here comes the weird thing. I stopped the dnsspoof, stopped the ip forwarding sysctl -w net.ipv4.ip_forward=0 and I started the exactly the same exact dnsspoof as last time again, it worked! This really confused me, because after that, I tried to start arpspoof and dnsspoof without setting ip_forward to 1 at all, I left it to be the default 0, and it did not work, because the arp traffic was not working (which is excepted!!). ArpSpoof and dnsspoof both work ONLY IF the process "ip forwarding is firstly enabled and then disabled" completed once, before launching dnsspoof. Ip forwarding only on gives dnsspoof not working, ip forwarding only always off gives arpspoof not working. Besides that, two more strange things I failed to understand. 1, Sometimes, the "ip forward on and off" cycle must be done in the same terminal where the dnsspoof takes place, in order to make it work. Switching on then off in another terminal simply leads to arpspoof failure. 2, Here is the log/feedback of a DnsSpoof root@kali:~# dnsspoof -i eth0 -f dnshost.spoof dnsspoof: listening on eth0 [udp dst port 53 and not src 192.168.0.113] 192.168.0.104.62290 > 192.168.1.1.53: 4678+ A? www.youtube.com 192.168.0.104.62290 > 192.168.0.1.53: 4678+ A? www.youtube.com 192.168.0.104.65063 > 192.168.1.1.53: 31827+ A? www.youtube.com 192.168.0.104.65063 > 192.168.0.1.53: 31827+ A? www.youtube.com 192.168.0.104.55426 > 192.168.1.1.53: 51608+ A? www.sina.com 192.168.0.104.55426 > 192.168.0.1.53: 51608+ A? www.sina.com 192.168.0.104.54794 > 192.168.1.1.53: 5651+ A? www.sina.com 192.168.0.104.54794 > 192.168.0.1.53: 5651+ A? www.sina.com 192.168.0.104.60485 > 192.168.1.1.53: 2950+ A? www.sina.com 192.168.0.104.63394 > 192.168.1.1.53: 41196+ A? www.facebook.com 192.168.0.104.63394 > 192.168.0.1.53: 41196+ A? www.facebook.com 192.168.0.104.52953 > 192.168.1.1.53: 6912+ A? www.facebook.com 192.168.0.104.52953 > 192.168.0.1.53: 6912+ A? www.facebook.com ^Croot@kali:~# dnsspoof -i eth0 -f dnshost.spoof dnsspoof: listening on eth0 [udp dst port 53 and not src 192.168.0.113] 192.168.0.104.53807 > 192.168.1.1.53: 60485+ A? www.youtube.com 192.168.0.104.53807 > 192.168.1.1.53: 60485+ A? www.youtube.com 192.168.0.104.50239 > 192.168.1.1.53: 28894+ A? www.sina.com 192.168.0.104.50239 > 192.168.1.1.53: 28894+ A? www.sina.com The second launch was a failed one, the first one succeeded. The router I am targeting should be 192.168.0.1, as the router B, in the second launch, it is interacting with only router A (192.168.1.1), I am not sure what does that mean and if it has something to do with the failure directly, because in the next few attempts, a feedback situation like this second launch worked sometimes. I am almost 100% sure this issue was due to the two routers, but I am still not able to understand why, or even find a way to make it always work. Please, any suggestion will be appreciated! Thanks
  6. Hello Hak5 Community - I've been having a tough time with my new LAN turtle. I'll try to keep this as succinct as possible.. 1. My LAN turtle is accessible via SSH from the local host at 172.16.84.X 2. With ethernet cable plugged in, eth1 gets an IP address in my home subnet range of 10.0.0.x, and an amber link light. 3. From the shell on the turtle, I can ping the gateway (10.0.0.1), I can ping other machines on that subnet. I have internet DNS resolution. I can even do things like wget http://example.com and that works too... But whenever I try to get updates via the "GUI" on the turtle, it tells me my turtle is currently offline! Its infuriating! I have flashed the turtle manually using the latest code available from https://downloads.lanturtle.com/ using instructions provided by Darren Kitchen. Any ideas guys? Thanks for all your help. Hak5 rocks!
  7. Lan turle v.s. public school

    I am a security tester and I have been hired at a public school. What I'm wanting to achieve is to be able to access the school network from my home. I understand on connecting my computer and the turtle to a vpn. Example: «My home computer» > VPN > lan turtle > school computer > «school network» Basically the goal is to plug the turtle (with the right modules) into a computer and plug the Ethernet cord into the lan turtle. Then go home and access the network and do what I need to do. Example: Ethernet > lan turtle > school computer > school network The questions are: 1. Does the host computer (the one with the turtle plugged in) need to be on? 2. Does the host computer being logged off matter? 3. Would my theory work? 4. How could I get a list of every user on the network (school systems are tricky, any user can be Logged in on any computer)? 5. Will it just be that school network or will I also access the entire county school network?
  8. Creating a lan

    Just getting started with the Pineapple Nano and this seems like a silly question. But how can I make the nano a lan device so other devices kan communicate with each other like having the nano as a portable router with internet?
×