Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Explpit #7

Open
umerov1999 opened this issue Jan 10, 2016 · 3 comments
Open

Explpit #7

umerov1999 opened this issue Jan 10, 2016 · 3 comments

Comments

@umerov1999
Copy link

This exploit doesn't work in GT-N5100 in official android and Cyanogenmod 11 or 12.1, but in stagefright detector, my device is vulnerable. My shellcode.bin in attached file(Shellcode - reverse_tcp host 192.168.1.21 port 1996).
shellcode.bin.zip

@dadreamer
Copy link

dadreamer commented Jun 16, 2017

Same here. I've followed all the instructions to a tee, but still can't get reverse shell. My phone loads the page with mp4 and I see the connection details on the linux server side. But the server keeps reloading the page and no back connection at all.

If you're interested in the details, it's here.

@dvolvox
Copy link

dvolvox commented Sep 3, 2017

Same here on a LG-D620. Any updates?

@dadreamer
Copy link

@dvolvox
I suppose, there will be no updates to this issue, because this exploit as another similar ones, is very device specific. It means that it will NOT work until you have some memory addresses written to exploit's config. To achieve this you'll need IDA, kernel dump and basic assembler experience. And root access, of course. If you don't have any, you are going to drop this for sure.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants