2025-01-25 19:20:54 -05:00
2025-01-25 10:40:10 -05:00
2024-08-13 08:03:34 -04:00
2024-08-08 18:43:48 -04:00
2024-08-13 08:03:34 -04:00
2024-08-12 17:45:44 -04:00
a
2024-08-15 15:42:25 -04:00
2025-01-25 10:24:09 -05:00
2024-10-07 22:16:57 -04:00
2024-08-13 08:03:34 -04:00
2025-01-25 10:43:21 -05:00
2024-08-12 17:03:13 -04:00

icarus

This tool allows us to unenroll devices with device management interception with a proxy and a Certificate Authority
Clone this repo with git clone --recursive

New configs what does this mean

These new configs have rolled keys. We are testing the compatibility of these new keys for interception

Setup and installation instructions

Set up the environment by running the following commands. Make sure to have python3 and python3-venv installed

  • make setup-venv
  • make enter-venv
  • make setup-python
  • make build-packed-data
  • bash get_original_data.sh
  • bash make_out.sh myCA.der

After doing this the output directory will be generated. The output directory that is generated will be used in the shim.

  • bash modify.sh <shim path>
  • Now boot your shim.
  • In the terminal of the shim, run mount /dev/disk/by-label/STATE /mnt/stateful_partition
  • bash /mnt/stateful_partition/usr/bin/inshim.sh
  • Reboot the device
  • Open the network configuration by clicking the lower left button, connecting to wifi, and then change the proxy settings
  • Set proxy settings to manual
  • Set HTTPS ip to the IP you used to host the proxy server.
  • Resume setup and it will unenroll.

Server setup (Only for people hosting servers)

Requirements: npm, node
run make start-server

Description
No description provided
Readme 290 KiB
Languages
Shell 72.1%
Python 19.6%
Makefile 8.3%