From 9a869033d6b6a310e3574264080fcd621dbc5148 Mon Sep 17 00:00:00 2001
From: Archimax <64978924+EnterTheVoid-x86@users.noreply.github.com>
Date: Sat, 25 Jan 2025 22:16:11 -0500
Subject: [PATCH] README overhaul
---
README.md | 54 ++++++++++++++++++++++++++++++++----------------------
1 file changed, 32 insertions(+), 22 deletions(-)
diff --git a/README.md b/README.md
index 1f41acd..1cef0a9 100644
--- a/README.md
+++ b/README.md
@@ -1,17 +1,19 @@
-# icarus
-This tool allows us to unenroll devices with device management interception with a proxy and a Certificate Authority
-Clone this repo with `git clone --recursive`
+# ICARUS
+An exploit for Chrome devices which allows people to unenroll devices with device management interception using a proxy and a custom Certificate Authority.
-## IMPORTANT NOTICE
-DO NOT USE ANY PUBLIC IP ADDRESSES FOR ICARUS AS A PROXY, YOU WILL RISK YOUR DATA and YOU WILL BE REMOTELY COMPROMISED.
-ANYTHING GOOGLE CAN REMOTELY PERFORM ON YOUR DEVICE, ICARUS CAN BE USED TO DO. AN EXAMPLE OF THIS IS INSTALL EXTENSIONS, SPY, USE YOUR CAMERA, REMOTE INTO YOUR DEVICE, GET YOUR PASSWORDS, AND MORE.
-ONLY SELF HOST ICARUS, NEVER USE A PUBLIC SERVER!
+> [!IMPORTANT]
+> DO NOT USE ANY PUBLIC IP ADDRESSES FOR ICARUS AS A PROXY, YOU WILL RISK YOUR DATA and YOU WILL BE REMOTELY COMPROMISED.
+> ANYTHING GOOGLE CAN REMOTELY PERFORM ON YOUR DEVICE, ICARUS CAN BE USED TO DO. AN EXAMPLE OF THIS IS INSTALL EXTENSIONS, SPY, USE YOUR CAMERA, REMOTE INTO YOUR DEVICE, GET YOUR PASSWORDS, AND MORE.
+> ONLY SELF HOST ICARUS, NEVER USE A PUBLIC SERVER!
-## New configs what does this mean
-These new configs have rolled keys. We are testing the compatibility of these new keys for interception
+## New configs?
+"New configs" have rolled keys. We are testing the compatibility of these new keys for interception.
## Setup and installation instructions
-Set up the environment by running the following commands. Make sure to have python3 and python3-venv installed
+Clone the repo with ``git clone --recursive https://github.com/MunyDev/icarus/`` and change directory to it.
+
+Set up the environment by running the following commands (Make sure you have both python3 and python3-venv installed beforehand):
+
- `make setup-venv`
- `make enter-venv`
- `make setup-python`
@@ -19,20 +21,28 @@ Set up the environment by running the following commands. Make sure to have pyth
- `bash get_original_data.sh`
- `bash make_out.sh myCA.der`
-After doing this the output directory will be generated. The output directory that is generated will be used in the shim.
-- `bash modify.sh `
-- Now boot your shim.
-- In the terminal of the shim, run `mount /dev/disk/by-label/STATE /mnt/stateful_partition`
-- `bash /mnt/stateful_partition/usr/bin/inshim.sh`
-- Reboot the device
-- Open the network configuration by clicking the lower left button, connecting to wifi, and then change the proxy settings
-- Set proxy settings to manual
-- Set HTTPS ip to the IP you used to host the proxy server.
-- Resume setup and it will unenroll.
+After doing this the output directory (from here on reffered to as PKIMetadata) will be generated, which is the custom Certificate Authority.
-## Server setup (Only for people hosting servers)
+Now, to modify the shim with the generated PKIMetadata:
+
+- `bash modify.sh `
+
+Now boot the shim, and in the terminal of the shim, run these commands:
+
+`mount /dev/disk/by-label/STATE /mnt/stateful_partition`
+
+`bash /mnt/stateful_partition/usr/bin/inshim.sh`
+
+### Server setup
Requirements: npm, node
-run `make start-server`
+Run `make start-server` to start your proxy, then continue with the instructions below.
+
+## Setup and installation instructions, continued
+Reboot the device. You'll boot into verified mode. Once you have your server running, open the network configuration by clicking the lower left button, connecting to wifi, and then change the proxy settings accordingly.
+
+- Set proxy settings to manual
+- Set HTTPS IP to the IP you used to host the proxy server.
+- Resume setup and your device will unenroll.
## Credits
- [MunyDev](https://github.com/MunyDev) - Creating this exploit