Struthian Posted July 21, 2020 Share Posted July 21, 2020 Promotions mention multi-vector attacks. I get that the firmware may have future developments and so I speculate on what they could be. The CROC can emulate storage or ethernet devices but can it log traffic through those devices or match access? If the storage device connected had "bait" files, could it log someone's looking through them, what they might copy and so on? Can the Croc use it's Wifi to be like the Turtle, but with Wifi not the ethernet port? Could someone connect a USB ethernet adapter and then the Croc can intercept what goes through it? I am also excited for whether a USB hub could be connected to the CROC and multiple devices get handled through it. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.