Hak5 Lan Turtle is an USB stick which gives RAT to the Attacker computer
Hak5 LAN Turtle can unlock any password protected computer
What is it?
LANTurtle is a Smart USB Ethernet device designed to act as a shell on a network. This shell also has the added benefit of controlling all packets going into a computer.
How does it work?
It acts as an Ethernet to USB device, this allows for the target computer to be connected to the network/internet all while giving the LANTurtle internet access and network access. With this you can use a reverse shell via SSH or Metasploit. You can also launch MiTM attacks with tools like URLSnarf as well as map and attack the network from your reverse shell.
Drop a Lan Turtle Get a shell for lifetime
The LAN Turtle is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle monitoring capabilities.
Housed within a generic “USB Ethernet Adapter” case, the LAN Turtle’s covert appearance allows it to blend into many IT environments.
To use the LAN Turtle, first you need to plug in the USB into your computer and a Ethernet cable to the other end so it can get updates and the responder module. Open putty (if you are using windows) and SSH to 172.16.84.1. Once you set it up you need to download the responder module. You will find it under the module manager. See the lanturtle wiki to learn more about modules.
Once you add the responder, you will see it as one of your options. You need to select it and select Configure.
Next you need to enable and start responder. When doing so, it will inform you that dependencies are missing and auto download Once that is done, responder should show up on your module list with a X next to it representing that its ready to rock. Now you need to exit the turtle GUI to get you to the turtle CLI.
Hak5 lan turtle also provides ssh connection to the victim computer check out the fuller post for more info
Fuller used the Hak5 LAN Turtle using the wiki and videos here. Basically the capturing is done with Laurent Gaffié’s Responder so you need to find a way to get Responder onto the device. The Hak5 Turtle already has a module for it.
Fuller says that the hack works on the following systems :
- Windows 98 SE
- Windows 2000 SP4
- Windows XP SP3
- Windows 7 SP1
- Windows 10 (Enterprise and Home)
- OSX El Capitan / Mavericks
“The average time for freshly inserted into a locked workstation and by the time I have creds is about 13 seconds, all depends on the system,”
The Fuller’s experiment shows that there is nothing called a safe and secure locked computer and he proves that security is just an illusion. What makes the hack doubly dangerous that the Hak5 LAN Turtle is cheap and publically available for anyone to grab it. Also, Hak5 LAN Turtle being smaller in size is MUCH easier to pass off. You can just carry it in your palm without anybody noticing it and carry out your hack attack. Only one thing though for this hack to work, a hacker needs physical access to the target computer or laptop.
Moreover the Source code is available free on github.