Struthian Posted July 21, 2020 Posted July 21, 2020 Promotions mention multi-vector attacks. I get that the firmware may have future developments and so I speculate on what they could be. The CROC can emulate storage or ethernet devices but can it log traffic through those devices or match access? If the storage device connected had "bait" files, could it log someone's looking through them, what they might copy and so on? Can the Croc use it's Wifi to be like the Turtle, but with Wifi not the ethernet port? Could someone connect a USB ethernet adapter and then the Croc can intercept what goes through it? I am also excited for whether a USB hub could be connected to the CROC and multiple devices get handled through it.
Recommended Posts
Archived
This topic is now archived and is closed to further replies.