Advertisement
Guest User

GrayKey

a guest
Apr 17th, 2018
799
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.48 KB | None | 0 0
  1. Services
  2.  
  3. 2332
  4.  
  5. tcp
  6.  
  7. telnet
  8.  
  9. Welcome to the Sierra Wireless Inc. ALEOS Environment GX440 login:
  10.  
  11. 8080
  12.  
  13. tcp
  14.  
  15. http
  16.  
  17.  
  18.  
  19. HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Content-Length: 15621 Date: Wed, 11 Apr 2018 05:36:28 GMT
  20.  
  21. 8081
  22.  
  23. tcp
  24.  
  25. https-simple-new
  26.  
  27.  
  28.  
  29. HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Content-Length: 45260 Date: Mon, 09 Apr 2018 15:00:11 GMT <!DOCTYPE html> <html lang="en"> <head> <title>GrayKey</title> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <script type=text/javascript src="/static/js/jquery-3.2.1.min.js"></script> <script type=text/javascript src="/static/js/deviceinfo.js"></script> <link rel=stylesheet type=text/css href="/static/css/bootstrap.css"> <link rel=stylesheet type=text/css href="/static/css/style.css"> <script> var lastApplogicVersion = null; var sawDataCopyComplete = false; var seenFirstPoll = false; var pollInterval = null; var settingsObj = {"ALPHANUMERIC_DICTIONARY": {"info": {"help": "To brute force a complex alphanumeric passcode, upload a custom password dictionary. If a dictionary is not uploaded, GrayKey will not attempt to brute force custom alphanumeric passcodes. The format of the dictionary is a plaintext file with one word per line.", "name": "Custom alphanumeric dictionary", "type": "FILE"}, "value": "File \u0027passcode.txt\u0027, 10.0B"}, "AUTOMATIC_DATA_DOWNLOAD": {"info": {"help": "If disabled, data extraction must be manually initiated from the GrayKey UI.", "name": "Automatically perform data extraction", "type": "BOOL"}, "value": true}, "COLLECT_ROOTFS": {"info": {"help": "Collect the read-only system partition during data extraction. The system partition can be collected, but under normal circumstances is not able to be modified by the device user.", "name": "Collect system partition", "type": "BOOL"}, "value": true}, "DISABLE_SESHAT": {"info": {"help": "Persistently disable future enrollment in SE-bound passcodes on the device after initial access.", "name": "Disable SE-bound passcode enrollment", "type": "BOOL"}, "value": true}, "DOWNLOAD_INACCESSIBLE_METADATA": {"info": {"help": "If an immediate extraction of accessible data is occurring, collect metadata for inaccessible files. The inaccessible files will appear empty, but the metadata will be accurate. This can occur in two instances - (1) SE-Bound and Before First Unlock or (2) \"Automatically perform data extraction\" is disabled and user has initiated an extraction before passcode discovery.", "name": "Extract metadata for inaccessible files", "type": "BOOL"}, "value": true}, "DOWNLOAD_PROCMEM": {"info": {"help": "Enabling this setting will extract memory from all running processes after initial access.", "name": "Extract process memory After First Unlock", "type": "BOOL"}, "value": true}, "INITIAL_DOWNLOAD_SESHAT": {"info": {"help": "Perform immediate extraction of all accessible data when the device has an SE-bound passcode and is in the Before First Unlock state. This may be desired because bruteforce could take a very long time.", "name": "Immediate extraction when SE-bound passcode Before First Unlock", "type": "BOOL"}, "value": true}, "STORE_STATE_NVRAM": {"info": {"help": "If checked, the agent will save bruteforce state in NVRAM every 6 hours. If device power is lost, when the agent is re-installed it will restart the passcode bruteforce at the last saved state. Once the agent is uninstalled (manually or automatically), the state will be removed from NVRAM. Writing to NVRAM has no effect on the device filesystem.", "name": "Save bruteforce state in NVRAM", "type": "BOOL"}, "value": true}}; String.prototype.toReadableSize = function () { var sz_num = parseInt(this, 10); // don't forget the second param if (sz_num < 1024) return sz_num; else if (sz_num < 1024*1024) return Math.floor(sz_num / 1024)+"KB"; else if (sz_num < 1024*1024*1024) return Math.floor(sz_num / (1024*1024))+"MB"; var gb = sz_num / (1024*1024*1024); return gb.toFixed(2)+"GB"; } String.prototype.toHHMMSS = function () { var sec_num = parseInt(this, 10); // don't forget the second param var hours = Math.floor(sec_num / 3600); var minutes = Math.floor((sec_num - (hours * 3600)) / 60); var seconds = sec_num - (hours * 3600) - (minutes * 60); if (hours < 10) {hours = "0"+hours;} if (minutes < 10) {minutes = "0"+minutes;} if (seconds < 10) {seconds = "0"+seconds;} return hours+':'+minutes+':'+seconds; } function pollExploitStatus() { $.getJSON('/exploitStatus', function(data) { var keepPolling = true; if (data) { console.log(data); if ('version' in data && data['version'] != lastApplogicVersion) { if (lastApplogicVersion == null) { lastApplogicVersion = data['version']; } else { // applogic has been updated window.location.reload(true); return; } } if ('nresults' in data && data["nresults"] > 0) { $("#hasResults .btn").text(data["nresults"]+" stored results"); $("#hasResults").show() } else { $("#hasResults").hide() } $("#dataDownloadReady").hide(); showAttachedDeviceInfo(data); var exploit_phase = data['phase']; if (exploit_phase == "waiting") keepPolling = updateAttachedDeviceInfoWaiting(data);
  30.  
  31. 9191
  32.  
  33. tcp
  34.  
  35. http-simple-new
  36.  
  37.  
  38.  
  39. HTTP/1.1 200 OK Server: Sierra Wireless Inc, Embedded Server Date: Sat, 14 Apr 2018 21:14:20 GMT Connection: close Content-Type: text/html Content-Length: 4825 Last-Modified: Wed, 05 Aug 2015 21:17:51 GMT Cache-Control: no-cache
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement