Jump to content

Andrew Imeson

Members
  • Content Count

    5
  • Joined

  • Last visited

About Andrew Imeson

  • Rank
    Newbie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Excellent. I'm not very hardware savvy, do you have any suggestions for what type of cable to purchase to connect to the serial console?
  2. If you have Linux administration skillset, OpenVPN works reasonably well. The clients are inconsistent across platforms, but they work. Years ago I used the Juniper MAG VPN appliances and they were very nice as far as configuration options (enforcing AV definition updates, patch level, etc) and had workable clients. Juniper spun that product off into its own company since then called Pulse Secure. I do not know if they're still solid.
  3. I'm not concerned about the warranty, I just want shell access to the device to be able to load my own software to do things with the images on to it.
  4. I'd like to modify the Screen Crab and install my own software on it. Is it possible to "root" the device? I'm assuming it runs Linux. Popping it open I see 5 pins that are labelled GWD, RX, TX, 3.3V, and 5V.
  5. I just got my Bash Bunny today. Running the updater from macOS Catalina required a workaround. Steps to reproduce: Download the Bunny Updater to /Volumes/BashBunny Extract it by using Finder (important: Extracting it via the `unzip` lead to an unlaunchable .app) Right click the BunnyUpdater app and click "Open" (this is important to get the security prompt to allow you to open it) It launches in Terminal.app with this message My workaround was to add this to my Zsh profile EXPECTED_LOCATION=/Volumes/BashBunny if [[ -d $EXPECTED_LOCATION ]]; then export BUNNYPATH=$EXPECTED_LOCATION fi My guess is macOS security improvements broke this, but that's just a guess.
×
×
  • Create New...