Jump to content

hacker4711

Members
  • Posts

    4
  • Joined

  • Last visited

Posts posted by hacker4711

  1. On 5/6/2023 at 11:22 PM, dark_pyrro said:

    Does the Croc only have the protected arming mode in the config.txt file? No WiFi network configured? If WiFi is configured, you could try to access the Croc using ssh and try to disable the protection "mode".

    Hi dark,

    thanks for your fast answer. I think the problem for the arming mode is the buggy language files in the keycroc. The Wifi is configured and your solution is a good approach to unprotect the device.

    At the moment we are looking for a valid certificate authority for the ca files on the device.

    He tries to connect to our side but with let's encrypt (,https flag) and thawte certificates the log files shows "unknown certificate authority".

    It seems that they are signing with other ca's with are not on the device.

    Do you know a certificate vendor with works with the default certificate files on the keycroc.

    That would be the solution when the device connects back.

    It's a pity that the binary has no ignore certificate flag because the config has port 443 and we can not change the port to 80.

    Greetings

     

     

  2. Hi dark,

    maybe there is a bug in the key croc because the protected aiming mode doesn't react to the password #Hero123!#Hero123!.

    Is it possible that he has some issues with the SHIFT for # and 123?

    At the moment it's not possible to unprotect the aiming mode with the password #Hero123!#Hero123!

    The config has just the password and no timeout.

    I need some expert for that issues to unprotect the key croc.

×
×
  • Create New...