hyln9 / VIKIROOT

CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow
GNU General Public License v3.0
266 stars 96 forks source link

Not Working version 6.0.1 #20

Closed ferquinz closed 6 years ago

ferquinz commented 7 years ago

I download the code and when laun make get this:

/opt/android-ndk-r15c-linux-x86_64//toolchains/aarch64-linux-android-4.9/prebuilt/linux-x86_64/bin/aarch64-linux-android-as -o payload.o payload.s /opt/android-ndk-r15c-linux-x86_64//toolchains/aarch64-linux-android-4.9/prebuilt/linux-x86_64/bin/aarch64-linux-android-objcopy -O binary payload.o payload xxd -i payload payload.h /opt/android-ndk-r15c-linux-x86_64/ndk-build NDK_PROJECT_PATH=. APP_BUILD_SCRIPT=./Android.mk APP_ABI=x86_64 APP_PLATFORM=android-23 make[1]: Entering directory /root/VIKIROOT [x86_64] Compile : vikiroot <= exploit.c ./exploit.c:90:27: warning: duplicate 'const' declaration specifier [-Wduplicate-decl-specifier] static const struct entry const entry_db[] = { ^ 1 warning generated. [x86_64] Executable : vikiroot [x86_64] Install : vikiroot => libs/x86_64/vikiroot make[1]: Leaving directory /root/VIKIROOT

I've tried to do it manual push the executable inside the devie and make the chmod and launch the exploit and receive this again:

Reverse shell target: 127.0.0.1:1337

Internal error: insufficient place for payload.

What could be happend?

hyln9 commented 6 years ago

See https://github.com/hyln9/VIKIROOT#troubleshooting