Jump to content

ArcadeProjects

New Members
  • Posts

    10
  • Joined

  • Last visited

Posts posted by ArcadeProjects

  1. On 7/15/2021 at 10:19 PM, x=usr(1536) said:

    I'm seriously on the fence right now about buying a VCS and bringing it out to the pentest village (or its equivalent) at Defcon this year.  That would be a very interesting live-fire exercise; I'm just not certain that I can budget it between now and August 5th.

    Hopefully you made this happen. 

  2. On 7/19/2021 at 1:19 PM, 0_obeWAN said:

    @ArcadeProjects

    Hello,

    On Github.com you write "The root of the Dashboard appears to use some sort of encrypted file names." 

    Does it mean that there is no way (due to encryption or atypical files) to expect find and modify files like .xml to modify Dashboard appearance ?

     

    Thanks again for Debian Buster code name :) 

     

      Reveal hidden contents

    imageproxy.php?img=&key=f4dcc336a70d5c68104933379_DebianBusterforVCS.thumb.png.b720a53f8112add496ff0f8e21a24fcf.png

     

    it is unclear. I doubt the obfuscation is strong. Someone needs to research. 

     

    • Like 1
  3. 59 minutes ago, rayik said:

    @ArcadeProjects

     

    Script run and verified folders / files exist on mmcblk0p4.  Cannot connect

     

    Not sure if should connect in Apertis boot screen or Atari OS.  In Apertis screen (CTR +C) device is not connecting to network.  In Atari OS I get connect refused, but able to ping ok.  Picture shows nc output when trying to connect in Atari OS mode. 

     

    Not sure what to do.

     

     

    vcs snip.PNG

    Wireless, or wired? I've seen some inconsistencies between both. I use wired exclusively for now. 

  4. On 6/1/2021 at 5:29 PM, 0_obeWAN said:

    For what I see (structure system), maybe hope come from https://www.apertis.org/ community (I don't know it) where AtariOS seems to com from 

    This will allow you to have a persistent root shell on the running Apertis system. It exploits the OverlayFS features to set a root and user password, and launch a backdoor root shell on port 4444. 

     

    https://github.com/ArcadeHustle/AtariVCSroot

    https://github.com/ArcadeHustle/AtariVCSroot/blob/main/atarivcs.sh

     

    E5egiBGXwAYlGlm.jpeg

    • Like 1
    • Thanks 2
×
×
  • Create New...