By Administrator on May 27, 2025
Beginner

SOURCE: https://docs.hak5.org/lan-turtle


  1. LAN Turtle by Hak5
  2. Getting Started
  3. LAN Turtle Basics
  4. The Module System
  5. Default Settings
  6. SSH Clients
  7. Setup Guides
  8. Connecting for the First Time
  9. Setting up a new LAN Turtle
  10. Installing Modules
  11. Your First Reverse Shell
  12. FAQ / Troubleshooting
  13. Power Considerations
  14. Specifications
  15. Factory Reset
  16. Manual Upgrade
  17. Video Guides
  18. First Boot and Software Update
  19. The Turtle Shell and Turtle Modules
  20. Metasploit and LAN Turtle with Meterpreter
  21. Persistent Shell Access with AutoSSH
  22. Remote File Systems with SSHFS
  23. Man-in-the-Middle with URL Snarf
  24. Man-in-the-Middle with DNS Spoof
  25. Obtaining Credentials from a Locked PC

Powered by GitBook


LAN Turtle by Hak5

USB Ethernet adapters with covert backdoors. These seemingly innocent USB Ethernet adapters are discreet remote access toolkits and man-in-the-middles for penetration testers and systems administrators.



The e-book PDF generated by this document may not format correctly on all devices. For the most-to-date version, please see https://docs.hak5.org




More articles on CYBER-SECURITY



More articles on CYBER-SECURITY
Comments

No comments yet.

Add a comment
Ctrl+Enter to add comment