snorez/exploits

How long the exploit should take?

Opened this issue · 5 comments

How long the exploit should take?

It never completes even i leave it 48 hours

~/exploit $ ./exploit
WARNING: linker: /data/data/com.termux/files/home/exploit/poc3: unsupported flags DT_FLAGS_1=0x8000001
spray_pipes: 0x780
spray done... 

its stuck here for very long time(also i ignore the linker warning its will disappear after stripping the binary)
htop report the exploit does doing processing (sometime its in interruptible sleep)

compile command: ~/Android/Sdk/ndk/23.1.7779620/toolchains/llvm/prebuilt/linux-x86_64/bin/aarch64-linux-android24-clang exploit.c -o exploit then i transfer the executable to my android phone

uname -a: Linux localhost 3.18.31-perf-g810e576 #1 SMP PREEMPT Mon Aug 10 11:41:32 CST 2020 aarch64 Android

Android 7.1.1 CHP1801

Also its exploit for CVE-2015-1805

Oh,, this poc is very old...
I didn't test this on Android. However, you may rewrite the code and check the modprobe_path(This may not be available on Android): grep modprobe_path /proc/kallsyms cat /proc/sys/kernel/modprobe

Line 48

unsigned long target_addr = 0xffffffff81aa40e0;

ye not available grep modprobe_path /proc/kallsyms show 0 which is same for every kernel symbols

but if it where correct target_addr how long it should take for you

30 seconds, I guess.

and access denied for cat /proc/sys/kernel/modprobe