Closed Androxyde closed 10 years ago
It is CVE-2013-6282 exploit. It is based on my code. https://gist.github.com/fi01/7500988 It doesn't work on secure devices they are restricted to use ptrace().
To use this exploit, I find we can use pipe_ioctl(). It seems that it works on all devices they have CVE-2013-6282 vulnerability. It is already added as libput_user_exploit.
great :-)
is it possible anyway, instead of maintaining a device database as struct, to have exploit variable parameters in a file, that way, no need to rebuild the toolkit for every new device ? that would be really nice
get sources here : https://www.dropbox.com/s/7bwrd6kznp31lfi/rootkit.zip
I modded original code as follow ;
The tool reads addresses from a text file (one included for LT26 in zip bundle). By looking code, you will see how those addresses are affected to variables and what it means ;-)
Regards, Androxyde