Skip to content

Commit de9b8da

Browse files
committed
add device information to documentation
1 parent 16f2dc4 commit de9b8da

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

documentation/modules/exploit/android/local/put_user_vroot.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ This modules exploits a vulnerability in the linux kernel on an Android device,
44

55
The exploit uses a read kernel memory primitive to first figure out the correct offsets for the device, before using the write primitive to overwrite the ptmx.fsync handler to a function that will elevate the current process to root. Finally /dev/ptmx is opened, and fsync called to trigger the exploit.
66

7+
This exploit should work on any vulnerable device and is not device specific. In the example below a Samsung Galaxy S4 running Android version 4.3 was targetted.
8+
79
## Usage
810

911
You'll first need to obtain a session on the target device. Once the module is loaded, one simply needs to set the ```SESSION``` option and configure the handler. The exploit can take a while to run on the device so it is configured with ```WfsDelay``` option to wait 120 seconds for a session. If you have not had a session after this time you can assume the device is not vulnerable.

0 commit comments

Comments
 (0)