Skip to content
This repository has been archived by the owner on Jan 26, 2024. It is now read-only.

Repo For Working on Dirty Cow Based Android Root Method

Notifications You must be signed in to change notification settings

BlackHoleSecurity/DirtyCowAndroid

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 

Repository files navigation

DirtyCowAndroid

Repo For Working on Dirty Cow Based Android Root Method
Currently Linux Only
Youtube: https://www.youtube.com/watch?v=bzrRWfDOQcM

Should Spawn a root shell on device
Usage sudo make root
Output:
[] mmap 0xb6f00000
[
] exploit (patch)
[] currently 0xb6f00000=464c457f
[
] madvise = 0xb6f00000 13708
[] madvise = 0 1048576
[
] /proc/self/mem 0 1048576
[*] exploited 0xb6f00000=464c457f
adb shell /system/bin/run-as
running as uid 2000
uid 0
root@ZTE-V811:/ #

##Bugs / Problems
1)
System Will Hang If You Exec a command on spawned shell Temp Fix: Exit Back to Terminal and type
"adb shell"
"run-as"
Going "adb shell run-as" will produce the hang
2) Android 5 (Samsung Galaxy S4)
setresgid/setresuid failed

  1. Incompatible with devices with system partitions made read-only by the hardware, such as the DigiLand DL718M and other supercheap devices.

Oringal PoC Code: https://github.com/timwr/CVE-2016-5195

About

Repo For Working on Dirty Cow Based Android Root Method

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 79.8%
  • Makefile 20.2%