Created by Patrick Casey, Alex Guerriero and Connor Reardon
- Get stage 1 exploit working on chrome browser on x86-64 linux machine (only works on the javascript shell as of now) difficulty -> easyish
- Compile Chrome for ARM
- Compile d8 for ARM and test exploit on d8 shell
- Get stage 1 exploit working on chrome browser on actual arm phone (shell then browser) difficulty -> medium
- Find vulnerable kernel version for CVE-2019-2181 difficulty -> easyish
- Compile it for arm android difficulty -> easy
- Get it on the phone difficulty -> mediumish?
- Write/take exploit to get it working from adb shell difficulty -> easy/medium/hard <- depends on what you want
- Take working exploit and get it working from chrome difficulty -> medium/hard
- Set up a dummy native binary for android
- Compile openssl library to do encryption
- Ninja stuff
- Exfil data
- Listen for phone and send exploit file
- Listen again and send implant
- Pull encrypted data
- Undo the encryption, leaving raw WhatsApp database
- Parse WhatsApp database for messages
- Move C2 infrastructure off of localhost to an accessible IP address, craft link to the C2