How to use Hak5 LAN Turtle for Offensive Security Red Teaming
By Administrator on May 27, 2025
BeginnerSOURCE: https://docs.hak5.org/lan-turtle
- LAN Turtle by Hak5
- Getting Started
- LAN Turtle Basics
- The Module System
- Default Settings
- SSH Clients
- Setup Guides
- Connecting for the First Time
- Setting up a new LAN Turtle
- Installing Modules
- Your First Reverse Shell
- FAQ / Troubleshooting
- Power Considerations
- Specifications
- Factory Reset
- Manual Upgrade
- Video Guides
- First Boot and Software Update
- The Turtle Shell and Turtle Modules
- Metasploit and LAN Turtle with Meterpreter
- Persistent Shell Access with AutoSSH
- Remote File Systems with SSHFS
- Man-in-the-Middle with URL Snarf
- Man-in-the-Middle with DNS Spoof
- Obtaining Credentials from a Locked PC
LAN Turtle by Hak5
USB Ethernet adapters with covert backdoors. These seemingly innocent USB Ethernet adapters are discreet remote access toolkits and man-in-the-middles for penetration testers and systems administrators.
The e-book PDF generated by this document may not format correctly on all devices. For the most-to-date version, please see https://docs.hak5.org
Was this article helpful?
More articles on CYBER-SECURITY