Closed RickyDivjakovski closed 6 years ago
What is "nothing happens"?
it doesnt return anything, doesnt return if success or not, tried opening root shell after and still nothing
Well, please run it under an adb shell so that I can know exactly what is happened.
I did, pushed to /data/tmp, set permissions, ran the exploit, does not output anything On 26 Mar 2017 1:10 AM, "Virgil Hou" notifications@github.com wrote:
Well, please run it under an adb shell so that I can know exactly what is happened.
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/hyln9/VIKIROOT/issues/11#issuecomment-289214101, or mute the thread https://github.com/notifications/unsubscribe-auth/AD5jgYpNxJUh4o6c6Ztwe-uE4yiG7Qqpks5rpSBugaJpZM4MaUQd .
lg g5 us992 android 7.0 1|h1:/data/local/tmp $ reboot recovery
D:\program\adb>adb shell error: device '(null)' not found
D:\program\adb>adb shell h1:/ $ cd data h1:/data $ cd local h1:/data/local $ cd tmp h1:/data/local/tmp $ ./exploit 1111
Reverse shell target: 127.0.0.1:1111
Exploit process starts.
Inject: patch 1/2
Inject: patch 2/2
Please wake up you phone now.
Waiting for reverse connect shell. 总是waiting for reverse ,我用 nc 127.0.0.1 1111 之后的shell 并没有执行/system/bin/sh,输入命令没有任何输出???
@Ricky310711 Are there any outputs like "Reverse shell target:"? @skywikia Please make sure your device meets all the prerequisites in readme and send me the debug file.
Can anybody explain to me what does "payload.s" is that "payload.h" that we are looking for...? How to compile it, can you help me?
compiled the latest source code, builds fine yet doesnt work (ZTE blade blitz x64), set permissions 777 and execute ./exploit but nothing happens.
Also happy to test on nougat