You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Sorry the title is not very explicite...and my approximative english...
I test your wonderfull tool since one week.
After de pairing (good RF adress + Key)
First, From my computer’s terminal I run “sudo ./munifying pair”
Then, From LOGITacker console I run “pair device run”
The pairing data (i.e. encryption keys) will be stored into LOGITacker’s flash.
And then I stock the device data with "devices storage save xx:xx:xx:xx:xx"
At last I use "options discover onhit passive-enum on"
I can sniff and pair my device (logitech MK700/710 with vulnerability), but when i am in passive enumeration mode and i press A key letter i have this output :
Hi @ALL
Sorry the title is not very explicite...and my approximative english...
I test your wonderfull tool since one week.
After de pairing (good RF adress + Key)
I can sniff and pair my device (logitech MK700/710 with vulnerability), but when i am in passive enumeration mode and i press A key letter i have this output :
but the output may be this (source : mame82/UnifyingVulnsDisclosureRepo#2)
We see " LOGITACKER_PROCESSOR_PASIVE_ENUM: Key 1: HID_KEY_A" except that i dont have this reslut line.
In the other hand, if i press the same key, each time i have a different result.
Do you have some ideas to resolve this ?
Thank Up
The text was updated successfully, but these errors were encountered: