Jump to content

hacker4711

Members
  • Posts

    4
  • Joined

  • Last visited

Everything posted by hacker4711

  1. Any change to speed up the execution?
  2. Is ist an expected behaviour that the shark jack executes the payload two minutes after booting? It's a long time to wait for the payload.
  3. Hi dark, thanks for your fast answer. I think the problem for the arming mode is the buggy language files in the keycroc. The Wifi is configured and your solution is a good approach to unprotect the device. At the moment we are looking for a valid certificate authority for the ca files on the device. He tries to connect to our side but with let's encrypt (,https flag) and thawte certificates the log files shows "unknown certificate authority". It seems that they are signing with other ca's with are not on the device. Do you know a certificate vendor with works with the default certificate files on the keycroc. That would be the solution when the device connects back. It's a pity that the binary has no ignore certificate flag because the config has port 443 and we can not change the port to 80. Greetings
  4. Hi dark, maybe there is a bug in the key croc because the protected aiming mode doesn't react to the password #Hero123!#Hero123!. Is it possible that he has some issues with the SHIFT for # and 123? At the moment it's not possible to unprotect the aiming mode with the password #Hero123!#Hero123! The config has just the password and no timeout. I need some expert for that issues to unprotect the key croc.
×
×
  • Create New...