The Key Croc can be configured to connect to a Cloud C2 instance for remote keystroke monitoring, injection, exfiltration and payload management.
To use this feature, the WiFi must be configured via the
config.txt on the Key Croc udisk.
Learn more about this self-hosted server and download the free community edition from https://c2.hak5.org
Registering the device to Cloud C2
From the Cloud C2 device listing, click the (+) Add Device button.
From the Add Device dialog, name the device, select Key Croc as the device type and click Add Device.
From the new devices Overview page, click Setup to download the
With the Key Croc connected and in arming mode, save the
device.configfile to the root of the Key Croc udisk.
Finally, safely eject the Key Croc udisk and reboot the Key Croc by unplugging and replugging the device.
For additional help on using Cloud C2 server, see the Cloud C2 documentation at https://docs.hak5.org
Information on using Cloud C2 functions in your payloads can be found in the Payload Development section of this documentation.