jcadduono / android_external_dirtycow

CVE-2016-5195 (dirtycow/dirtyc0w) - recowvery fork
https://build.nethunter.com/android-tools/dirtycow/
146 stars 37 forks source link

stuck please help armv8-A 64Bit supported 32-bit armeabi-v7a #17

Open hkleib opened 6 years ago

hkleib commented 6 years ago

PS C:\adb> adb push dirtycow /data/local/tmp 666 KB/s (13728 bytes in 0.020s) PS C:\adb> adb push recowvery-applypatch /data/local/tmp 1958 KB/s (22144 bytes in 0.011s) PS C:\adb> adb push recowvery-app_process64 /data/local/tmp 584 KB/s (10200 bytes in 0.017s) PS C:\adb> adb push recowvery-run-as /data/local/tmp 1591 KB/s (17988 bytes in 0.011s) PS C:\adb> adb shell shell@F04G:/ $ cd /data/local/tmp shell@F04G:/data/local/tmp $ chmod 0777 * shell@F04G:/data/local/tmp $ /dirtycow /system/bin/applypatch recowvery-applypatch < warning: new file size (22144) and file old size (66512) differ

size 66512

[] mmap 0xf736f000 [] exploit (patch) [] currently 0xf736f000=464c457f [] madvise = 0xf736f000 66512 [] madvise = 0 1048576 [] /proc/self/mem -1048576 1048576 [*] exploited 0xf736f000=464c457f /dirtycow /system/bin/app_process64 recowvery-app_process64 < warning: new file size (10200) and file old size (22456) differ

size 22456

[] mmap 0xf7122000 [] exploit (patch) [] currently 0xf7122000=464c457f [] madvise = 0xf7122000 22456 [] madvise = 0 1048576 [] /proc/self/mem -1048576 1048576 [*] exploited 0xf7122000=464c457f shell@F04G:/data/local/tmp $ exit PS C:\adb> adb logcat -s recowvery --------- beginning of system --------- beginning of main

=================== its stop right there, i am waiting about 10 minutes but no message told me it was successful

please help me, you are the best