# Current Status ## Server ✅ **UP**: http://154.57.164.76:32127/api ## Confirmed Data - UID: `04f6555b` - Username: `axel_outrun` - Server Response: `{'door_status': 'Locked', 'flag': 'HTB{}'}` ## Current Approach **Brute Force Running**: Testing passcodes 0-100,000 - Progress: 10,000 / 100,000 (10%) - Speed: 93 tests/sec - Est. completion: ~15 minutes ## What We've Tried ❌ Common CTF values (0, 1337, 31337, DEADBEEF, etc.) ❌ All 6-byte sequences from extracted data ❌ Multiple auth_code format combinations ❌ MISO values as keys directly ## Next Steps 1. Wait for brute force to complete (0-100k) 2. If not found, expand to 0-1M range 3. Or properly decode SPI in Saleae to find actual key bytes Check progress: `python -c "import sys; sys.path.append('.'); from get_terminal_output import *"`