• Premium Cyber Security Tools
  • RFID Security
  • Digital Forensic
  • LEA & Rugged Products
  • Procurement
  • Premium Cyber Security Tools
  • RFID Security
  • Digital Forensic
  • LEA & Rugged Products
  • Procurement

Hak5 LAN Turtle 3G

295.00 €
incl. VAT, plus delivery
Not in stock
Delivery time: 5 day(s)

Description


LAN Turtle Hak5


The LAN Turtle is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.

Housed within a generic "USB Ethernet Adapter" case, the LAN Turtle’s covert appearance allows it to blend into many IT environments.


USB Ethernet adapters are ubiquitous


This seemingly innocent USB Ethernet adapter packs a covert backdoor. With man-in-the-middle tools built in, you can gobble up all of the interesting data. Supports massive storage options from the MicroSD card reader hidden inside. Save heaps of network traffic, or load it up with all your favorite pentest tools.


Easy Module Setup


Setting up a reverse shell for persistent remote access is just a matter of checking a few boxes.

With a repository browser built-in, getting more modules is automatic.

Or write a modules with the simple API.


Cloud ready


Pentest from anywhere online with the free self-hosted Cloud C2. Exfiltrate loot and pivot through the LAN with ease. Even drop into a root shell right from your web browser for full access to the entire LAN Turtle arsenal.


Penetration Testers


  • Pivot with a persistent Meterpreter session in Metasploit
  • Scan the network using nmap
  • DNS Spoof clients to phishing sites
  • Exfiltrate data via C2EXFIL or SSHFS
  • Man-in-the-Middle inline computers capturing browser traffic


Systems Administrators


  • Access to the entire LAN through a site-to-site VPN
  • Automate management scripts with hourly email reports
  • Receive alerts based on defined network traffic
  • Maintain remote access with Cloud C²
  • Quickly gather pcap (packet captures) files