hyln9 / VIKIROOT

CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow
GNU General Public License v3.0
266 stars 96 forks source link

How to connect the reverse shell? #6

Closed pppdddxxx closed 7 years ago

pppdddxxx commented 7 years ago

thanks for your poc ,@hyln9 ,It's interesting! when i execute the poc on my phone ,i get the informatin as follows: shell@shamu:/data/local/tmp $ ./exploit 1234

Reverse shell target: 127.0.0.1:1234

Exploit process starts.

Inject: patch 1/2

Inject: patch 2/2

Please wake up you phone now.

Waiting for reverse connect shell.

!but now,i don't know how to get the reverse shell and i also want to know how to connect the shell by nc ,can you tell me about that,thanks!