hyln9 / VIKIROOT

CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow
GNU General Public License v3.0
266 stars 96 forks source link

can't execute: Permission denied #23

Closed ghost closed 6 years ago

ghost commented 6 years ago

D:\Program Files (x86)\Android\android-sdk\platform-tools>adb shell /data/local/ tmp/exploit /system/bin/sh: /data/local/tmp/exploit: can't execute: Permission denied

D:\Program Files (x86)\Android\android-sdk\platform-tools>

D:\Program Files (x86)\Android\android-sdk\platform-tools>adb shell sh /data/loc al/tmp/exploit /data/local/tmp/exploit[1]: syntax error: '(' unexpected

D:\Program Files (x86)\Android\android-sdk\platform-tools>

ghost commented 6 years ago

D:\Program Files (x86)\Android\android-sdk\platform-tools>adb shell /data/local/ tmp/exploit

CVE-2016-5195 POC FOR ANDROID 6.0.1 MARSHMALLOW

Usage:

/data/local/tmp/exploit port: use local terminal.

/data/local/tmp/exploit ip port: use remote terminal.

is OK?

elgolondrino commented 6 years ago

Where is payload.h?

elgolondrino commented 6 years ago

Is it payload.s?