Hak5 Lan Turtle is an USB stick which gives RAT to the Attacker computer

Hak5 LAN Turtle can unlock any password protected computer

What is it?

LANTurtle is a Smart USB Ethernet device designed to act as a shell on a network.  This shell also has the added benefit of controlling all packets going into a computer.

How does it work?

It acts as an Ethernet to USB device, this allows for the target computer to be connected to the network/internet all while giving the LANTurtle internet access and network access.  With this you can use a reverse shell via SSH or Metasploit.  You can also launch MiTM attacks with tools like URLSnarf as well as map and attack the network from your reverse shell.

Drop a Lan Turtle Get a shell for lifetime

The LAN Turtle is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle monitoring capabilities.

Housed within a generic “USB Ethernet Adapter” case, the LAN Turtle’s covert appearance allows it to blend into many IT environments.

How to use it?

The potent power of the $50 device called Hak5 LAN Turtle and available on Hakshop here, was demonstrated by a security researcher. Mubix “Rob” Fuller.

To use the LAN Turtle, first you need to plug in the USB into your computer and a Ethernet cable to the other end so it can get updates and the responder module. Open putty (if you are using windows) and SSH to Once you set it up you need to download the responder module. You will find it under the module manager. See the lanturtle wiki to learn more about modules.

Once you add the responder, you will see it as one of your options. You need to select it and select Configure.

Next you need to enable and start responder. When doing so, it will inform you that dependencies are missing and auto download Once that is done, responder should show up on your module list with a X next to it representing that its ready to rock. Now you need to exit the turtle GUI to get you to the turtle CLI.

Hak5 lan turtle also provides ssh connection to the victim computer check out the fuller post for more info

Fuller used the Hak5 LAN Turtle using the wiki and videos here. Basically the capturing is done with Laurent Gaffié’s Responder so you need to find a way to get Responder onto the device. The Hak5 Turtle already has a module for it.

Fuller says that the hack works on the following systems :

  • Windows 98 SE
  • Windows 2000 SP4
  • Windows XP SP3
  • Windows 7 SP1
  • Windows 10 (Enterprise and Home)
  • OSX El Capitan / Mavericks

“The average time for freshly inserted into a locked workstation and by the time I have creds is about 13 seconds, all depends on the system,”

The Fuller’s experiment shows that there is nothing called a safe and secure locked computer and he proves that security is just an illusion. What makes the hack doubly dangerous that the Hak5 LAN Turtle is cheap and publically available for anyone to grab it. Also, Hak5 LAN Turtle being smaller in size is MUCH easier to pass off. You can just carry it in your palm without anybody noticing it and carry out your hack attack. Only one thing though for this hack to work, a hacker needs physical access to the target computer or laptop.

Moreover the Source code is available free on github.




  1. Having a lot content and articles do you ever run into any problems of copyright infringement? My site has a lot of exclusive material I’ve either written myself or outsourced but it seems a lot of it is popping it up all over the internet without my authorization. Do you know any methods to help reduce content from being stolen? I’d truly appreciate it.

  2. I’ve learn several good stuff here. Definitely value bookmarking for revisiting. I surprise how a lot attempt you put to create the sort of wonderful informative website.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.