hyln9 / VIKIROOT

CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow
GNU General Public License v3.0
266 stars 96 forks source link

Compiled and not working #11

Closed RickyDivjakovski closed 6 years ago

RickyDivjakovski commented 7 years ago

compiled the latest source code, builds fine yet doesnt work (ZTE blade blitz x64), set permissions 777 and execute ./exploit but nothing happens.

Also happy to test on nougat

hyln9 commented 7 years ago

What is "nothing happens"?

RickyDivjakovski commented 7 years ago

it doesnt return anything, doesnt return if success or not, tried opening root shell after and still nothing

hyln9 commented 7 years ago

Well, please run it under an adb shell so that I can know exactly what is happened.

RickyDivjakovski commented 7 years ago

I did, pushed to /data/tmp, set permissions, ran the exploit, does not output anything On 26 Mar 2017 1:10 AM, "Virgil Hou" notifications@github.com wrote:

Well, please run it under an adb shell so that I can know exactly what is happened.

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/hyln9/VIKIROOT/issues/11#issuecomment-289214101, or mute the thread https://github.com/notifications/unsubscribe-auth/AD5jgYpNxJUh4o6c6Ztwe-uE4yiG7Qqpks5rpSBugaJpZM4MaUQd .

skywikia commented 7 years ago

lg g5 us992 android 7.0 1|h1:/data/local/tmp $ reboot recovery

D:\program\adb>adb shell error: device '(null)' not found

D:\program\adb>adb shell h1:/ $ cd data h1:/data $ cd local h1:/data/local $ cd tmp h1:/data/local/tmp $ ./exploit 1111

Reverse shell target: 127.0.0.1:1111

Exploit process starts.

Inject: patch 1/2

Inject: patch 2/2

Please wake up you phone now.

Waiting for reverse connect shell. 总是waiting for reverse ,我用 nc 127.0.0.1 1111 之后的shell 并没有执行/system/bin/sh,输入命令没有任何输出???

hyln9 commented 7 years ago

@Ricky310711 Are there any outputs like "Reverse shell target:"? @skywikia Please make sure your device meets all the prerequisites in readme and send me the debug file.

elgolondrino commented 6 years ago

Can anybody explain to me what does "payload.s" is that "payload.h" that we are looking for...? How to compile it, can you help me?