Skip to content

Commit

Permalink
* how did this ever work?
Browse files Browse the repository at this point in the history
- kill sysveri even more and leave no witnesses.
- fix a bug that somehow wasn't breaking anything?
- fix a rop bug regarding sys-v stack alignment.
- provide more krop helper functions.
- provide a smaller img (0x1800 bytes, also very compressible). see [#29] [#31]
- add wk expl sanity check.
- make sure pages accessed by kernel are locked.
- try to reduce time spent with interrupts disabled.

- @@@ Note: extensive testing has not been performed. it might be worse so panic at your own risk! @@@
  • Loading branch information
ChendoChap committed Jan 17, 2022
1 parent 8a92cf3 commit 886f4a0
Show file tree
Hide file tree
Showing 6 changed files with 640 additions and 44 deletions.
2 changes: 1 addition & 1 deletion README.md
Expand Up @@ -12,7 +12,7 @@ The following patches are applied to the kernel:
4) Custom system call #11 (`kexec()`) to execute arbitrary code in kernel mode
5) Allow unprivileged users to call `setuid(0)` successfully. Works as a status check, doubles as a privilege escalation.
6) (`sys_dynlib_load_prx`) patch
7) Disable delayed panics from sysVeri
7) Disables sysVeri

## Short how-to
This exploit is unlike previous ones where they were based purely in software. Triggering the vulnerability requires plugging in a specially formatted USB device at just the right time. In the repository you'll find a .img file. You can write this .img to a USB using something like Win32DiskImager.
Expand Down
Binary file added exfathax_pico.img
Binary file not shown.

0 comments on commit 886f4a0

Please sign in to comment.