Comments (7)
No, I could not get it to extract to the temp folder. You only need to install it with the /x
command (which is supposed to extract the files but only runs the installation process on some browsers). After you have installed it, search for the "launch lockdown browser" button of your institution's webpage. You should find an URL to execute LockDown Browser, copy it and paste it in /withdll /d:GetSystemMetrics-Hook.dll $lockdown_runtime "URL"
alongside the other lines I posted above, in order. If you cannot find the URL by dragging your cursor to the button, you can view the page's source code with your browser, and it should be there around somewhere.
So anyway, all you need to do is to open Powershell, paste these lines of code:
cd "C:\Users\WDAGUtilityAccount\Desktop\runtime_directory"
./withdll /d:GetSystemMetrics-Hook.dll $lockdown_runtime "URL" # done!
$lockdown_runtime
is the variable of where LockDown Browser files are. You may need to tweak it a little.
from lockdown-browser.
Ok, I downloaded the Aleks file that you linked to above, and I can confirm that it is “pre-extracted”. For the regular Lockdown Browser installers, the provided file is just a “pre-installer” that you have to run to unpack the “real” installer into the
temp
folder; but for the “OEM” installer, the provided file is already the “real” installer, so the initial unpacking step is both unnecessary and impossible.Now, the “real” installer ultimately unpacks its files into
C:\Program Files\…
, but it also does some registry stuff, so you can't just manually unpack it intoC:\Program Files\…
and expect it to work. So the best way to automatically install it would be to convince it to do a “silent install”—the/s "…\setup.iss"
command does that for the regular Browser, but I have no idea how (or if it's even possible) for the “OEM” version.But if you really want to unpack the installer, it's not that hard. Inside the installer
.exe
there are three “InstallShield Cabinet” headers. The easiest way to get their offsets is withbinwalk
, but you can search the file for4953 6328 f00a 0004
if you prefer. Next, extract<header 2 offset> -- <header 3 offset>
intoout1.cab
and extract<header 3 offset> -- EOF
intoout2.cab
. Installunshield
, then rununshield -g DefaultComponent x out1.cab
. And that’s it—all of the Lockdown Browser's runtime files should now be inside theDefaultComponent/
folder.
Thanks, I'll give it a try sometime.
from lockdown-browser.
You can do this manually if you want to use any similar LockDown:
- Navigate to the Sandbox runtime_directory -- cd "C:\Users\WDAGUtilityAccount\Desktop\runtime_directory"
- ./withdll /d:GetSystemMetrics-Hook.dll $lockdown_runtime "URL" -- done!
You do not need to change rldb:// URL protocol, mistake on my end. The URL has to include ldb, ldb1, etc. It should be a button with a similar protocol, as shown below.
ldb:dh%7BKS6poDqwsi1SHVGEJ+KMYaelPZ56lqcNzohRRiV1bzFj3Hjq8lehqEug88UjowG1mK1Q8h2Rg6j8kFZQX0FdyA==%7D
from lockdown-browser.
Did you ever get it to work? If you did how did you get it to extract in to the temp folder?
from lockdown-browser.
No, I could not get it to extract to the temp folder. You only need to install it with the
/x
command (which is supposed to extract the files but only runs the installation process on some browsers). After you have installed it, search for the "launch lockdown browser" button of your institution's webpage. You should find an URL to execute LockDown Browser, copy it and paste it in/withdll /d:GetSystemMetrics-Hook.dll $lockdown_runtime "URL"
alongside the other lines I posted above, in order. If you cannot find the URL by dragging your cursor to the button, you can view the page's source code with your browser, and it should be there around somewhere.So anyway, all you need to do is to open Powershell, paste these lines of code:
cd "C:\Users\WDAGUtilityAccount\Desktop\runtime_directory" ./withdll /d:GetSystemMetrics-Hook.dll $lockdown_runtime "URL" # done!
$lockdown_runtime
is the variable of where LockDown Browser files are. You may need to tweak it a little.
These OEM versions seem to be quite tricky to make work, so I'm glad that someone finally figured out a solution. Thanks!
I have tried recording the InstallShield installation process, but it is the same deal. I hope someone knowledgeable in Powershell can create a workaround, definitely not me.
From some other comments that I've seen, I think that these OEM versions are “preextracted”, so maybe you can try deleting the extraction step
lockdown-browser/runtime_directory/sandbox_run.ps1
Lines 26 to 32 in 7248e29
and changing setup.exe
to the installer file name at
If that doesn't work, you might need a different setup.iss
file, which you can generate by changing the /s
above to /r
..
from lockdown-browser.
No, I could not get it to extract to the temp folder. You only need to install it with the
/x
command (which is supposed to extract the files but only runs the installation process on some browsers). After you have installed it, search for the "launch lockdown browser" button of your institution's webpage. You should find an URL to execute LockDown Browser, copy it and paste it in/withdll /d:GetSystemMetrics-Hook.dll $lockdown_runtime "URL"
alongside the other lines I posted above, in order. If you cannot find the URL by dragging your cursor to the button, you can view the page's source code with your browser, and it should be there around somewhere.So anyway, all you need to do is to open Powershell, paste these lines of code:
cd "C:\Users\WDAGUtilityAccount\Desktop\runtime_directory" ./withdll /d:GetSystemMetrics-Hook.dll $lockdown_runtime "URL" # done!
$lockdown_runtime
is the variable of where LockDown Browser files are. You may need to tweak it a little.These OEM versions seem to be quite tricky to make work, so I'm glad that someone finally figured out a solution. Thanks!
I have tried recording the InstallShield installation process, but it is the same deal. I hope someone knowledgeable in Powershell can create a workaround, definitely not me.
From some other comments that I've seen, I think that these OEM versions are “preextracted”, so maybe you can try deleting the extraction step
lockdown-browser/runtime_directory/sandbox_run.ps1
Lines 26 to 32 in 7248e29
and changing
setup.exe
to the installer file name atIf that doesn't work, you might need a different
setup.iss
file, which you can generate by changing the/s
above to/r
..
I cannot recall what I exactly tried to troubleshoot back then, but my general understanding is you cannot extract the exe anywhere. I tried the /s command, bunch of others I found in Stack Overflow. Finally, I joined a pwsh discord and their recommendation was that some installshields were impossible to break without reverse engineering, then I experimented quite a bit until I found this. I cannot remember pretty much anything of what I did but it works, somehow.
from lockdown-browser.
Ok, I downloaded the Aleks file that you linked to above, and I can confirm that it is “pre-extracted”. For the regular Lockdown Browser installers, the provided file is just a “pre-installer” that you have to run to unpack the “real” installer into the temp
folder; but for the “OEM” installer, the provided file is already the “real” installer, so the initial unpacking step is both unnecessary and impossible.
Now, the “real” installer ultimately unpacks its files into C:\Program Files\…
, but it also does some registry stuff, so you can't just manually unpack it into C:\Program Files\…
and expect it to work. So the best way to automatically install it would be to convince it to do a “silent install”—the /s "…\setup.iss"
command does that for the regular Browser, but I have no idea how (or if it's even possible) for the “OEM” version.
But if you really want to unpack the installer, it's not that hard. Inside the installer .exe
there are three “InstallShield Cabinet” headers. The easiest way to get their offsets is with binwalk
, but you can search the file for 4953 6328 f00a 0004
if you prefer. Next, extract <header 2 offset> -- <header 3 offset>
into out1.cab
and extract <header 3 offset> -- EOF
into out2.cab
. Install unshield
, then run unshield -g DefaultComponent x out1.cab
. And that’s it—all of the Lockdown Browser's runtime files should now be inside the DefaultComponent/
folder.
from lockdown-browser.
Related Issues (20)
- ALEKS doesn't play well? HOT 5
- Project Status HOT 1
- Minimizing the Sandbox is detected by the Browser HOT 1
- Update server is not supplying update information, or the connection to Update server is blocked. Please try again later. HOT 3
- Does not work on VM HOT 8
- Issue when I click open from my school site HOT 4
- Can you help me because I don't know where to start and I have a lockdown browser Lab OEM and if you help me and it works, I can pay you. HOT 1
- Does Not Work For Lockdown Browser OEM HOT 1
- Using with versions ≥ `2.1.2.04` may get your account permanently banned. HOT 22
- HELP HELP HELP HOT 2
- "This browser can't be used while Remote Desktop or Terminal Services are active" HOT 3
- Update server is not supplying update information
- Lockdown Browser Account Banned HOT 2
- LockDown Browser May Be Banning Your Institutional Account HOT 1
- Audio from webcam not going through. HOT 1
- Getting a "Processing Your image" at the Face Detection. Doesn't go through. HOT 2
- While running build.ps1 script, completely errors out at line 40. HOT 1
- IMPORTANT: Using new versions of Respondus Lockdown browser does not work HOT 2
- It's still working? HOT 2
- Permission isssue HOT 1
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from lockdown-browser.