tag:blogger.com,1999:blog-3606809368389861108.post4142516906509608708..comments2023-06-26T05:54:35.088-07:00Comments on C-skills: android trickerySebastianhttp://www.blogger.com/profile/11886596387140041622noreply@blogger.comBlogger14125tag:blogger.com,1999:blog-3606809368389861108.post-24755323814951153742011-06-06T06:44:05.367-07:002011-06-06T06:44:05.367-07:00Hi - I am really delighted to discover this. great...Hi - I am really delighted to discover this. great job!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-22081511925265847222011-05-26T18:08:40.050-07:002011-05-26T18:08:40.050-07:00Thank you!!! You often have interesting posts! The...Thank you!!! You often have interesting posts! They put me in good spirits )Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-3126024820385848842010-11-01T02:50:58.379-07:002010-11-01T02:50:58.379-07:00The root for Motorola does not seem to work
I tri...The root for Motorola does not seem to work<br /><br />I tried running ./exploid but end up with permission denied.<br /><br />Please help !!<br /><br />Thanks !K6FCChttps://www.blogger.com/profile/09788683625152197175noreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-67936358464122458452010-11-01T02:48:04.199-07:002010-11-01T02:48:04.199-07:00The root does not work on my motorola I1.. I keep ...The root does not work on my motorola I1.. I keep on getting permission denied when I run<br /><br />./exploid<br /><br />Please help !<br /><br />Thank you.<br />Khalil Ladjevardi<br />Los AngelesK6FCChttps://www.blogger.com/profile/09788683625152197175noreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-4791458841768860202010-08-08T23:52:04.368-07:002010-08-08T23:52:04.368-07:00Hi,
I've been trying, with little success, to...Hi,<br /><br />I've been trying, with little success, to get this working on the Wildfire.<br /><br />I've changed the block device for system remount to /dev/mtdblock3, but still have no luck with actually copying self to /system/bin/rootshell<br /><br />Furthermore, once the exploit has been run, certain hotplug actions cause an instant reboot and, obviously, abd disconnection. Any help would be gratefully received.<br /><br />Cheers,<br /><br />MartinUnknownhttps://www.blogger.com/profile/06851609528747160825noreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-65350309801188822022010-07-31T15:49:33.410-07:002010-07-31T15:49:33.410-07:00Works also on HTC Hero (1.5). Thanks !Works also on HTC Hero (1.5). Thanks !Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-2335018505964302252010-07-30T13:04:02.738-07:002010-07-30T13:04:02.738-07:00Does this work on the X10? (not mini or mini pro)Does this work on the X10? (not mini or mini pro)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-33124662092603057922010-07-24T07:14:29.635-07:002010-07-24T07:14:29.635-07:00will this work on the devour and any more info on ...will this work on the devour and any more info on the backflipUnknownhttps://www.blogger.com/profile/09272405335201475645noreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-89863009705425242242010-07-23T20:45:01.531-07:002010-07-23T20:45:01.531-07:00This also works on the Devour.This also works on the Devour.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-23918082252217182022010-07-23T14:47:46.248-07:002010-07-23T14:47:46.248-07:00After testing on Milestone, several conditions cou...After testing on Milestone, several conditions could be reduced/relaxed:<br /><br />1. /tmp can be used instead of /sqlite_stmt_jourals. They are both world writable.<br /><br />2. Changing for(;;); to exit(...) works. Perhaps the code was borrowed from other exploit?<br /><br />3. The exploid rootshell will be triggered by hotplug event after it has been setup properly. Thus sleep(3) can be removed.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-73411222009265826132010-07-22T13:06:03.506-07:002010-07-22T13:06:03.506-07:00Hi. Looks like this worked on the Droid X but does...Hi. Looks like this worked on the Droid X but does not seem to work on the Backflip because of the lack of /etc/firmware. Any ideas?Stilgernoreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-24973750708966520012010-07-22T12:57:50.447-07:002010-07-22T12:57:50.447-07:00Fantastic.Fantastic.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-23391368365480786162010-07-22T12:55:40.727-07:002010-07-22T12:55:40.727-07:00Saw this recently used to root the DroidX, kudos!
...Saw this recently used to root the DroidX, kudos!<br /><br />In a related vein, it looks like the Motorola Backflip has the same vulnerability, however it does not have <i>/etc/firmware</i>.<br /><br />Looking at the code (which I only partially follow, admittedly) I'm unsure why /etc/firmware is required. (I am assuming it's how one would use the firmware subsystem as the vector for attack.)<br /><br />Could you give an explanation/some pointers on what I might try to exploit this on the Backflip? (What about using <i>/dev/ashmem</i> instead of the firmware subsystem?)<br /><br />Thanks!<br /><br />--MorgulMorgulhttps://www.blogger.com/profile/09001599228129635819noreply@blogger.comtag:blogger.com,1999:blog-3606809368389861108.post-68374687120178040022010-07-22T08:40:06.678-07:002010-07-22T08:40:06.678-07:00It works on G1, Milestone. Thanks for the PoC.It works on G1, Milestone. Thanks for the PoC.Anonymousnoreply@blogger.com