# EOC 2-32 Login Mirror

This directory contains a snapshot of the unauthenticated login page from `http://ghn2e53.local/cgi-bin/login` and its directly referenced assets.

Files:
- `site/cgi-bin/login.html`: raw mirrored login page
- `site/md5.js`: mirrored client-side MD5 helper
- `site/cgi-bin/login-preview.html`: local preview copy with device paths rewritten for offline styling work

Notes:
- The device serves the page with `charset=gb2312`.
- The page hardcodes `LOGIN_USER=admin`.
- The challenge token in the HTML changes between requests, so the mirrored page is only a point-in-time snapshot.
- The provided password `46n7i9ne` did not authenticate when replayed against the device from this environment.

Reusable mirroring:
- Run `pwsh ./mirror/Mirror-Eoc232.ps1 -BaseUrl http://ghn2e53.local -OutputDir ./mirror/live -Password 46n7i9ne` to capture the login page and attempt the authenticated crawl.
- The script always mirrors `/cgi-bin/login` plus directly referenced assets, writes a `crawl-log.tsv`, and saves a session `README.txt`.
- If login succeeds, it also captures `/cgi-bin/left` and any menu-linked pages it discovers from that navigation frame.

For local rendering:
- Serve `mirror/site` as the web root if you want the raw `login.html` to resolve `/md5.js`.
- Open `site/cgi-bin/login-preview.html` directly if you only need a styling-safe local copy.
