Frequently Asked Questions

Our Pledge

We strive to provide an effortless turnkey solution that is both extremely intuitive and highly secure. The Telesploit framework was developed by penetration testers for penetration testers and leverages our decades of experience to deliver on this pledge.

Solution Overview

The Telesploit framework consists of three separate components: a server, a relay, and a client.

  • Server: A NUC based hardware or virtual machine platform running Kali or another systemd enabled Linux distribution that is deployed within the target (customer) environment.
  • Relay: An individually assigned cloud (AWS) instance built on Ubuntu 18.04 that leverages HAProxy and Let’s Encrypt to secure all communications.
  • Client: A Linux, Windows, or mobile (Android/iOS) environment for interacting with the Telesploit Server.

The Telesploit server provides multiple preconfigured services.

  • SSH: A full console connection.
  • VNC: A graphical desktop connection.
  • Squid: An upstream proxy for tools such as Burp Suite or to access local resources like Nessus
  • SOCKS: A configurable proxy for connecting to databases or any other SOCKS supported protocol.

The Telesploit relay provides additional collaboration capabilities.

  • Mattermost: An open source Slack-like communications platform.
  • IRC: Chat between the server, relay, and other clients.

FAQs

The Telesploit server is deployed with self-decrypting LUKS drives that rely on udev random data obtained from a custom provisioned SD card. This image can also be provided out-of-band for high-risk environments.

Every deployment includes a uniquely assigned and dedicated relay.

All communications between the server and relay are double checked for both certificate validity and SSH fingerprint matching.

The client also provides multiple checks to prevent Man-in-the-Middle attacks.

By default there are no listening services on the server’s network interface. All connections are through localhost only.

Every Telesploit deployment includes multiple preconfigured setup scripts for a variety of platforms that are downloadable from the assigned relay.

Linux/Mac: Custom bash scripts as well as Remmina configuration files are provided.

Windows: KiTTY (a PuTTY fork) and Bitvise Tunnelier configuration files are included by default.

Other: Documentation is provided for connecting with any of your preferred clients, including mobile (Android/iOS).

All connections require SSH key-based authentication. Password-based access is not allowed.

This is a core strength of the Telesploit solution. We preconfigure every deployment with the customer provided information, but even if that is incorrect we can recover with minimal customer interaction.

Each Telesploit deployment includes a 3G modem that can be plugged in to provide out-of-band support.

In addition, there is the option to securely pull GPG encrypted logs and update GPG configuration files through the included USB nub.

Basic Hardware: Intel i3, 4GB RAM, 500GB HDD

Enhanced Hardware: Intel i5, 8GB RAM, 1TB HDD

Virtual Machine: Support for VMware, Hyper-V, XenServer, and VirtualBox

Secondary Wireless: Alfa AC1200 USB

Widows 10 VM: Weaponized with FireEye Commando VM (requires the “enhanced” hardware platform)

The Telesploit solution is designed to be extremely low-touch. All that is required is an Ethernet connection and power.

For most configurations the answer is no. All connections are made outbound over TLS (port 443). No inbound connectivity is required.

LinkedIn
Twitter
Facebook
Instagram

Telesploit, LLC
3000 Custer Road
Suite 270#214
Plano, TX 75075

844.376.4437 (844-FROGGER)
info@telesploit.com