Remove wiki in favor of lanturtle.com documentation

pull/24/head
Sebastian Kinne 2017-11-10 14:46:44 +11:00
parent e421c2409a
commit ee98b6074a
No known key found for this signature in database
GPG Key ID: 7F899C8AF843F556
13 changed files with 13 additions and 436 deletions

View File

@ -1,6 +0,0 @@
{
"useSideMenu": true,
"lineBreaks": "gfm",
"additionalFooterText": "All content and images &copy; Hak5 LLC<br />",
"anchorCharacter": "#"
}

View File

@ -1,19 +0,0 @@
# Contributing to the Wiki
## Thank you
The WiFi Pineapple wiki is brought to you by the WiFi Pineapple team, and many other community members. As a community driven resource, the people who use and edit the wiki would be very greatful if you followed the few rules below, this page also has tips and tricks for making your article, which would also be fabulous.
All changes to the wiki can be contributed on [GitHub](https://github.com/hak5/wifipineapple-wiki)
Thanks,
WiFi Pineapple Team
## Markdown
Markdown Basics: https://help.github.com/articles/markdown-basics/
Markdown Syntax: http://daringfireball.net/projects/markdown/syntax
Table Generator: http://www.tablesgenerator.com/markdown_tables

Binary file not shown.

Before

Width:  |  Height:  |  Size: 116 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 67 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 25 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 32 KiB

File diff suppressed because one or more lines are too long

View File

@ -1,169 +0,0 @@
##About the LAN Turtle
**Drop a LAN Turtle. Get a Shell.**
The LAN Turtle is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle monitoring capabilities.
Housed within a generic "USB Ethernet Adapter" case, the LAN Turtles covert appearance allows it to blend into many IT environments.
---
##Purchase
* The Hak5 LAN Turtle is available from [The HakShop](http://www.hakshop.com/lanturtle).
---
##Use Cases
The LAN Turtle is exceptionally good at providing:
* Remote Access
* Network Intelligence
* Man-in-the-Middle
Deployment scenarios may include:
* Covertly installed inside a corporate network to provide the penetration tester with remote access via Metasploit's Meterpreter.
* Surreptitiously installed on a target computer to poison DNS, providing the penetration tester with possible phishing endpoints.
* Secretly installed between a target computer and LAN to intercept and log web traffic.
* Exfiltrate shared data from within the host LAN to an outside SSH filesystem.
* Act as an OpenVPN Gateway in to the host LAN allowing the systems administrator to manage or the penetration tester to audit all nodes accessible to the LAN Turtle remotely.
* Quickly initiate an automated map of the target network and provide a report to the penetration tester either on the device or delivered by email or HTTP.
* Provide a persistent reverse shell over SSH through an intermediate server for remote access to an internal network.
* Masquerade as a legitimate USB Ethernet adapter while performing any automated attack against the host computer or network using tools cross-compiled for the LAN Turtle's Linux-based OS.
---
##LAN Turtle Inside and Out
![LAN Turtle Diagram](images/diagram.png)
* USB Ethernet and Power
* Enumerates on the host computer as a generic USB Ethernet device. The onboard Linux-based system uses this Interface (eth0) to offer the host computer an IP address via DHCP.
* Covert Case
* Generic USB Ethernet Adapter case blends into the target network environment allowing for concealment behind desktops, in telephone closets and server racks.
* Ethernet
* Standard Ethernet port (eth1) set to obtain an IP address from the host LAN DHCP server. If present, will bridge with a host PC connected to the USB (eth0) port.
* Green Power Indicator LED
* Amber Status Indicator LED
* Reset Button (Inside Case)
* Press to reset to default configuration
* Hold while powering on to access HTTP firmware recovery
---
##Turtle Shell
The LAN Turtle is managed through the Turtle Shell - a text based, menu-driven graphical user interface accessible by SSH. The menus may be navigated using standard arrow, tab, escape and return keys as well as mouse in most terminals.
![Turtle Shell](images/shell-main.png)
The Turtle Shell's Configuration Menu provides the ability to change advanced settings such as Password, MAC address, IP address. Firmware updates may be checked for and installed as they become available.
By default the Turtle Shell will start at login via SSH unless disabled from the Configuration Menu.
Exiting the Turtle Shell returns the user to the LAN Turtle's bash shell. To return to the Turtle Shell, run the "turtle" command.
---
##Turtle Modules
The LAN Turtle uses a modular system for managing its various tools and services. Turtle modules may be started, stopped, enabled, disabled or configured from the Module Menu.
![Turtle Modules](images/shell-modules.png)
###Configure
Configuring a module typically involves entering data specific to your deployment. For example, when configuring the Meterpreter module, you must specify the listening host and port. When configuring the Nmap module you must specify a target, profile and log. Configuration changes made through the graphical Turtle Shell are generally saved in config files and are persistent upon reboot.
###Start / Stop
Once configured, a module may be Started or Stopped from the Module Menu. Generally a module may not be started until it has been configured. Some modules, such as the SSH Key Manager, do not support starting and only allow for configuration. Some modules stay running once started. For instance the autossh module will maintain a persistent secure shell until stopped. Other modules will start a task then stop when completed, such as script2email or nmap-scan.
###Enable / Disable
Modules may be set to start up once the LAN Turtle has booted. For example an OpenVPN session may be established upon power-up by first configuring the module and testing it using the start and stop feature. Once the module is achieving the desired result, the module may be Enabled from the Module Menu. Now the LAN Turtle can be deployed on a target network with the OpenVPN module establishing a connection without intervention from the user. An enabled module will start on every boot unless disabled from the Module Menu.
![Module Config](images/shell-configure.png)
###Additional Modules
The LAN Turtle is designed to enable rapid module development. Any supported language (such as bash, php, or python) may be used to write a Turtle Module. With just a few core functions required, modules may be quickly developed and tested. Once submitted to the LAN Turtle Module Repository, they may become available for other LAN Turtle users to download and enjoy. For more information on writing modules, consult the developer documentation at LANTurtle.com
---
##Connecting for the first time
When configuring the LAN Turtle for the first time, a direct connection to the operator's notebook or desktop computer is recommended. The USB plug will both power the LAN Turtle (as indicated by the Green LED) as well as expose a USB Ethernet adapter to the computer for management.
Once connected to the operator's computer via USB, the LAN Turtle will boot. The boot sequence completes in about 30 seconds, during which the the Amber LED will blink. The first time the LAN Turtle is plugged in, the Amber LED will continue blinking until initial configuration is completed via SSH.
Once bootup is complete, the LAN Turtle's network interface on the USB facing side will offer the host computer an IP address via DHCP.
Ensure the host computer is configured to accept IP from DHCP, or alternatively specify a static address in the LAN Turtle's IP range.
Once the LAN Turtle has completely booted and the host computer has been assigned an IP address, the operator may access the LAN Turtle's Shell via SSH.
####Default IP, Port, Username and Password
* IP Address: 172.16.84.1
* Port: 22 *SSH default*
* Username: root
* Password: sh3llz *Must change on initial setup*
---
##SSH Clients
The LAN Turtle is managed via the Turtle Shell, accessible via SSH.
###Linux and Mac
Linux and Mac operators are recommended to use the built in SSH client (typically openssh). With the LAN Turtle plugged into the user's PC, an SSH connection is usually initiated by issuing "**ssh root@172.16.84.1**" from the terminal.
###Windows
Since Microsoft does not bundle an SSH client with Windows by default, Windows users are encouraged to use the open source PuTTY client from: http://www.chiark.greenend.org.uk/~sgtatham/putty
Please Note: for the best experience, choose ISO-8859-1 Remote character set from Window > Translation. Otherwise the menu outlines may seem garbled.
![Putty Config](images/putty.png)
###Android
For quick access and configuration changes in the field, the LAN Turtle's Shell can be accessed from an Android Tablet or Smartphone by using a USB OTG cable and SSH client. **ConnectBot** is a free open source Secure Shell client available in the Google play store.
![Android LAN Turtle Connection](images/android.png)
---
##Power Considerations
The LAN Turtle is powered via USB and requires 5V at ~200mA. Typical power usage is 1 Watt. Below are some example deployment scenarios and power considerations.
* Covertly installed in an available USB port on the back of a desktop computer at a client site, either in an "Ethernet Pass-through" configuration (With Network access provided by the LAN Turtle) or standalone (such as for DNS Poisoning).
* Concealed in a network closet plugged into Ethernet powered by a USB Battery Pack. For example: the Pineapple Juice 15000 USB Battery from HakShop.com would power the LAN Turtle for ~3 days.
* Concealed in a telephone room plugged into a free Ethernet cable powered by a typical smartphone USB wall charger.
* Concealed in a server rack powered by a server's available USB port using a USB Data Blocker inline USB dongle (Available from HakShop.com) to prevent the server's operating system from identifying the LAN Turtle.
* Connected to a penetration tester's Android tablet or smartphone using a USB OTG cable (available from HakShop.com) for use on-the-go with an Android SSH client. Note: Some smartphones and tablets do not provide the current necessary to power the LAN Turtle. Most Nexus models have been tested to function properly.
##Specifications
* Atheros AR9331 SoC at 400 MHz MIPS
* 16 MB Onboard Flash
* 64 MB DDR2 RAM
* 10/100 Ethernet Port
* USB Ethernet Port - Realtek RTL8152
* Indicator LED (Green Power, Amber Status)
* Button (inside case for Factory Reset / Firmware Recovery)
* Dimensions: 95 x 23 x 31 mm
##Factory Reset / "Unbricking"
In the extreme case that a LAN Turtle has become permenantly inaccessible or inoperative, there is a quick method for recovery using a special web interface.
1. Download the latest factory image from https://downloads.lanturtle.com/turtle-2-factory.bin
2. Carefully open the LAN Turtle case by removing the two screws underneath the sticker on the bottom
3. While holding the button on the bottom of the LAN Turtle, plug the device into a computer
4. After 3 seconds let go of the button and wait an additional 30 seconds to receive an IP address from the LAN Turtle
5. If you do not receive an IP address in the 192.168.x range from the LAN Turtle within a minute, statically assign the LAN Turtle's interface to 192.168.1.2 (netmask 255.255.255.0)
6. Browse to the LAN Turtle firmware recovery web interface at http://192.168.1.1
7. Follow the on screen prompts to upload and flash the factory image downloaded in step 1
8. When the flash is complete the LAN Turtle will reboot and will be accessible again from 172.16.84.1 with the default username root and password sh3llz
##Manually Upgrading
LAN Turtle firmware may be updated"over the air" by choosing Check for Updates from the Config menu. If an Internet providing Ethernet connection is not available, updates may be flashed to the device manually using the following process:
1. Download the latest UPDATE file from https://downloads.lanturtle.com/
2. Verify that the MD5 checksums match
3. Manually SCP the file to the LAN Turtle in /tmp (ex: scp turtle-2.bin root@172.16.84.1:/tmp/)
4. From the LAN Turtle, exit shell to the bash prompt and issue: sysupgrade -n /tmp/turtle-2.bin
5. Wait about 5 minutes for the LAN Turtle to flash the firmware and reboot

View File

@ -1,9 +0,0 @@
# Hak5 Lan Turtle Wiki
[Home](index.md)
[Video Tutorials](videos.md)
[Purchase](http://www.hakshop.com/lanturtle)
[Forums](https://forums.hak5.org/index.php?/forum/88-lan-turtle/)

View File

@ -1,22 +0,0 @@
##LAN Turtle 101 - First Boot and Software Update##
[![LAN Turtle 101 - First Boot and Software Update](http://img.youtube.com/vi/YXPuw3HVJ78/0.jpg)](http://www.youtube.com/watch?v=YXPuw3HVJ78)
##LAN Turtle 102 - The Turtle Shell and Turtle Modules##
[![LAN Turtle 102 - The Turtle Shell and Turtle Modules](http://img.youtube.com/vi/Nr4VK4FDsuU/0.jpg)](http://www.youtube.com/watch?v=Nr4VK4FDsuU)
##LAN Turtle 103 - Metasploit and LAN Turtle with Meterpreter##
[![LAN Turtle 103 - Metasploit and LAN Turtle with Meterpreter](http://img.youtube.com/vi/P2Bbt3YWkBU/0.jpg)](http://www.youtube.com/watch?v=P2Bbt3YWkBU)
##LAN Turtle 104 - Persistent Shell Access with AutoSSH##
[![LAN Turtle 104 - Persistent Shell Access with AutoSSH](http://img.youtube.com/vi/uIdvvrDrRj0/0.jpg)](http://www.youtube.com/watch?v=uIdvvrDrRj0)
##LAN Turtle 105 - Remote File Systems with SSHFS##
[![LAN Turtle 105 - Remote File Systems with SSHFS](http://img.youtube.com/vi/l2ez6LZ6Y5I/0.jpg)](http://www.youtube.com/watch?v=l2ez6LZ6Y5I)
##LAN Turtle 106 - Man in the Middle with URLSnarf##
[![LAN Turtle 106 - Man in the Middle with URLSnarf](http://img.youtube.com/vi/Ika2uEIWlYc/0.jpg)](http://www.youtube.com/watch?v=Ika2uEIWlYc)
##LAN Turtle 107 - Man in the Middle DNSSpoof##
[![LAN Turtle 107 - Man in the Middle DNSSpoof](http://img.youtube.com/vi/4yNG12O2ynE/0.jpg)](http://www.youtube.com/watch?v=4yNG12O2ynE)