Key Croc
Search…
Configuring Cloud C²
The Key Croc can be configured to connect to a Cloud C2 instance for remote keystroke monitoring, injection, exfiltration and payload management. Learn more about this self-hosted server and download the free community edition from https://c2.hak5.org
To use this feature, the WiFi function must be configured from config.txt on the Key Croc udisk.
From the Cloud C2 device listing, click the (+) Add Device button. From the Add Device dialog, name the device, select Key Croc as the device type and click Add Device. From the new devices Overview page, click Setup to download the device.config file. With the Key Croc connected and in arming mode, save the device.config file on the root of the Key Croc udisk. Finally, safely eject the Key Croc udisk and reboot the Key Croc by unplugging and replugging the device. For additional help on using Cloud C2 server, see the Cloud C2 documentation at https://docs.hak5.org.
Information on using Cloud C2 functions in your payloads can be found in the Payload Development section of this documentation.
Copy link