Closed ghost closed 6 years ago
D:\Program Files (x86)\Android\android-sdk\platform-tools>adb shell /data/local/ tmp/exploit
CVE-2016-5195 POC FOR ANDROID 6.0.1 MARSHMALLOW
Usage:
/data/local/tmp/exploit port: use local terminal.
/data/local/tmp/exploit ip port: use remote terminal.
is OK?
Where is payload.h?
Is it payload.s?
D:\Program Files (x86)\Android\android-sdk\platform-tools>adb shell /data/local/ tmp/exploit /system/bin/sh: /data/local/tmp/exploit: can't execute: Permission denied
D:\Program Files (x86)\Android\android-sdk\platform-tools>
D:\Program Files (x86)\Android\android-sdk\platform-tools>adb shell sh /data/loc al/tmp/exploit /data/local/tmp/exploit[1]: syntax error: '(' unexpected
D:\Program Files (x86)\Android\android-sdk\platform-tools>