diff --git a/android/README.md b/android/README.md index b1d3cf9..a3e2ab0 100644 --- a/android/README.md +++ b/android/README.md @@ -10,9 +10,8 @@ For more details you may read the full technical white paper available here: https://www.armis.com/blueborne/ -In addition a detailed blog post on the exploitation of this vulnerability would also go live on Sunday 22nd of October here: - -https://www.armis.com/blog/ +In addition a detailed blog post on the exploitation of this vulnerability is available here: +https://www.armis.com/blueborne-on-android-exploiting-rce-over-the-air/ =============== diff --git a/android/doit.py b/android/doit.py index 2bf258c..11434fb 100644 --- a/android/doit.py +++ b/android/doit.py @@ -89,7 +89,7 @@ def set_rand_bdaddr(src_hci): def memory_leak_get_bases(src, src_hci, dst): - prog = log.progress('Doing stack memeory leak...') + prog = log.progress('Doing stack memory leak...') # Get leaked stack data. This memory leak gets "deterministic" "garbage" from the stack. result = bluedroid.do_sdp_info_leak(dst, src)