thanks for your poc ,@hyln9 ,It's interesting!
when i execute the poc on my phone ,i get the informatin as follows:
shell@shamu:/data/local/tmp $ ./exploit 1234
Reverse shell target: 127.0.0.1:1234
Exploit process starts.
Inject: patch 1/2
Inject: patch 2/2
Please wake up you phone now.
Waiting for reverse connect shell.
!but now,i don't know how to get the reverse shell and i also want to know how to connect the shell by nc ,can you tell me about that,thanks!
thanks for your poc ,@hyln9 ,It's interesting! when i execute the poc on my phone ,i get the informatin as follows: shell@shamu:/data/local/tmp $ ./exploit 1234
!but now,i don't know how to get the reverse shell and i also want to know how to connect the shell by nc ,can you tell me about that,thanks!