Open giveup opened 5 years ago
step 1 : i use wireless adb connect device
`adb connect 192.168.11.128
`$ ./exploit 5678
Reverse shell target: 127.0.0.1:9999 Exploit process starts. Inject: patch 1/2 Inject: patch 2/2 Please wake up you phone now. Waiting for reverse connect shell. Enjoy!
Reverse shell target: 127.0.0.1:9999
Exploit process starts.
Inject: patch 1/2
Inject: patch 2/2
Please wake up you phone now.
Waiting for reverse connect shell.
Enjoy!
====================TERMINAL====================
����host::features=cmd,stat_v2,shell_v2`
step 2: adb connect 192.168.11.128:9999
adb shell error: device offline
try to reconnect adb connect 192.168.11.128:9999 already connected to 192.168.11.128:9999
adb connect 192.168.11.128:9999 already connected to 192.168.11.128:9999
step 1 : i use wireless adb connect device
`adb connect 192.168.11.128
`$ ./exploit 5678
====================TERMINAL====================
����host::features=cmd,stat_v2,shell_v2`
step 2: adb connect 192.168.11.128:9999
adb shell error: device offline
try to reconnect
adb connect 192.168.11.128:9999 already connected to 192.168.11.128:9999