DroidForums.net is the original Verizon Android Forum! Registered Users do not see these ads. Please Register - It's Free!
Results 1 to 4 of 4

Thread: Compiling for Droid

  1. Junior Droid
    microbolt's Avatar
    Member #
    1861
    Join Date
    Nov 2009
    Location
    Tampa, FL
    Posts
    11
    Phone
    Motorola Droid
    #1

    Compiling for Droid: Possible Root Exploit

    Pretty sure I found a exploit that might provide root escalation for the droid. Seems this exploit affects the 2.6.29 kernel that the droid is running. Problem is I'm not very familiar with compiling apps for the ARM arch. Any ideas? This may finally land us root with the droid! =D Hopefully they didn't patch this in their kernel

    Here is a link to the source of the exploit:

    Linux Kernel 2.6.29 ptrace_attach() Local Root Race Condition Exploit
    Last edited by microbolt; 11-08-2009 at 07:49 PM.
  2.  
     
     
     
  3. Droid
    cizake's Avatar
    Member #
    1533
    Join Date
    Nov 2009
    Location
    Miami
    Posts
    38
    Phone
    Droid
    #2
    If only XDA team would create a Moto sub thread...we could wrap this up in 24 hours.
  4. Junior Droid
    Quickster357's Avatar
    Member #
    1059
    Join Date
    Nov 2009
    Location
    Frigid North of Central US
    Posts
    17
    Phone
    Moto Droid
    #3
    doesn't mean we can't ask them for some help. maybe they can take a quick look at it and provide some tips. there's always that chance.
  5. Junior Droid
    limaxray's Avatar
    Member #
    2252
    Join Date
    Nov 2009
    Posts
    8
    Phone
    Motorola Driod
    #4
    I've been able to compile and run the exploit but am having some trouble. The main issue is the linked exploits is for x86 machines and its shellcode (payload that is ran as root by the exploit) is in x86 assembly. I don't really know ARM asm, nor how to create such shellcodes, but I'd imaging someone out there does.

    I've attached my code that at least compiles. I think I fixed to to work correctly on ARM (to use ARM registers instead of x86 registers) but that could also need some tweaking.

    In any case, I'm not sure if the exploit even works, but it does occasionally report success so I am hopeful.
    Attached Files

Links

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Search tags for this page

2.6.29 local root exploit

,

android 2.6.29 exploit

,
android 2.6.29 exploits
,
arm local root exploit
,
compilation kernel android
,
compiling
,
droid compiling
,
local root exploit 2.6.29
,
shadow kernel config droid
,

sticky: how to compile the droid kernel

Click on a term to search our site for related topics.
Find us on Google+