[Q] zergrush root - General Questions and Answers

Hey,
Has anyone explained how zergrush works. I was wondering if someone has explained it. I want to understand how the linux vulnerability is exploited.

If you are a developer, the best way is to read through the source found in the developer's git repo here:
https://github.com/revolutionary/zergRush

Related

[Q] Source Link for 6210?

OK I'll probably get flamed by people like I did in the Development forum calling my simple question "STUPID"..... but could this be the link to the source code for the P6210?
https://opensource.samsung.com/index.jsp
We already knew where the source code was. The problem is that they have not provided the wifi drivers in the correct form, according to garyd9 the wifi drivers are only binary, so i think that means he won't be able to do much with those wifi drivers. Another problem is that the source has not been updated to work with the newest over the LA3 firmware samsung has provided according to garyd9. If we didn't have the source code, then garyd9 wouldn't have been able to build a custom kernel for our tablet. You can find his kernel here http://forum.xda-developers.com/showthread.php?t=1421466
Sorry if it sounds like if i'm being mean to you, but the source code links had already been posted a long time ago in the development section http://forum.xda-developers.com/showthread.php?t=1375911

pwn file in rooting

Hi All
I am trying to understand about rooting and while looking into the XFACTOR exploit, there is a pwn unix executable file that is used. Can anyone tell me what it is and how I can look into its source?
Thanks!
pwn2
pwn2 said:
Hi All
I am trying to understand about rooting and while looking into the XFACTOR exploit, there is a pwn unix executable file that is used. Can anyone tell me what it is and how I can look into its source?
Thanks!
pwn2
Click to expand...
Click to collapse
its the su binary
Edit: you stated it was a Unix executable. So I'm going to assume you know a bit about computers. But you asked how to view the source code...
Assume it was written in C/C++.
How do you expect to decompile that.
Your thread is honestly a little sketchy.

Android Security Vulnerabilities

mods: maybe this could get moved to Android Dev and Hacking/Misc Dev? This is my first post, and there's a minimum 10 post rule to post on the dev forums. I searched the forums and could not find a similar post, and it could be useful for ROM hackers.
I've been keeping track of a few upcoming risky vulnerabilities that modern devices may be vulnerable to, and possible patches. For those of you that embed custom kernels in your ROM, or want a secure kernel for your custom ROM, this should be useful. Hopefully we can have people chime in and post patches they think are needed. Now, these may be commonly used to root your device, but for those of you creating pre-rooted ROMs, you will probably want the patch to protect your devices from malicious activity.
http://www.cvedetails.com/cve/CVE-2012-4220/ also 4221 and 4222:
affects Android versions from 2.3 to 4.2 with a Qualcomm processor
patch here: https://www.codeaurora.org/particip...es/cve-2012-4220-cve-2012-4221-cve-2012-4222/
code execution, local priv, DoS
http://www.cvedetails.com/cve/CVE-2011-3874/
the infamous zergRush exploit for the vulnerability in libsysutils.so
PoC: https://github.com/revolutionary/zergRush/blob/master/zergRush.c
patch: http://code.google.com/p/android/issues/attachmentText?id=21681&aid=216810001000&name=patch.diff&token=zyMox2r00ZIPN7qD_zdjHy2cf10%3A1358973107051
affects Froyo and Gingerbread, which a lot of people are still working with. As a ROM dev, you might not be working with older Android versions, but this allows code execution.
samsung exynos flaw - I don't see a CVE for this yet
http://forum.xda-developers.com/showthread.php?t=2048511
"This device is R/W by all users and give access to all physical memory"
patch here, but another patch in that thread as well: http://review.cyanogenmod.org/#/c/29910/
"Ram dump, kernel code injection and others could be possible via app installation from Play Store" ouch
2012 CVEs:
http://www.cvedetails.com/vulnerabi...roduct_id-19997/year-2012/Google-Android.html
Anyone else know some good vulns and patches??
Hope this is helpful!
ogresavage said:
mods: maybe this could get moved to Android Dev and Hacking/Misc Dev? This is my first post, and there's a minimum 10 post rule to post on the dev forums. I searched the forums and could not find a similar post, and it could be useful for ROM hackers.
I've been keeping track of a few upcoming risky vulnerabilities that modern devices may be vulnerable to, and possible patches. For those of you that embed custom kernels in your ROM, or want a secure kernel for your custom ROM, this should be useful. Hopefully we can have people chime in and post patches they think are needed. Now, these may be commonly used to root your device, but for those of you creating pre-rooted ROMs, you will probably want the patch to protect your devices from malicious activity.
http://www.cvedetails.com/cve/CVE-2012-4220/ also 4221 and 4222:
affects Android versions from 2.3 to 4.2 with a Qualcomm processor
patch here: https://www.codeaurora.org/particip...es/cve-2012-4220-cve-2012-4221-cve-2012-4222/
code execution, local priv, DoS
http://www.cvedetails.com/cve/CVE-2011-3874/
the infamous zergRush exploit for the vulnerability in libsysutils.so
PoC: https://github.com/revolutionary/zergRush/blob/master/zergRush.c
patch: http://code.google.com/p/android/issues/attachmentText?id=21681&aid=216810001000&name=patch.diff&token=zyMox2r00ZIPN7qD_zdjHy2cf10%3A1358973107051
affects Froyo and Gingerbread, which a lot of people are still working with. As a ROM dev, you might not be working with older Android versions, but this allows code execution.
samsung exynos flaw - I don't see a CVE for this yet
http://forum.xda-developers.com/showthread.php?t=2048511
"This device is R/W by all users and give access to all physical memory"
patch here, but another patch in that thread as well: http://review.cyanogenmod.org/#/c/29910/
"Ram dump, kernel code injection and others could be possible via app installation from Play Store" ouch
2012 CVEs:
http://www.cvedetails.com/vulnerabi...roduct_id-19997/year-2012/Google-Android.html
Anyone else know some good vulns and patches??
Hope this is helpful!
Click to expand...
Click to collapse
I just installed Belarc Security and it discovered the first issues with the two others, 4220. 4221, 4222, not sure if I should be concerned...

[Q] Could someone explain me how to compile this?

Hi, i'm sort of starting in Android Developement and I found a proof of concept that looked interesting because it might exploit a vulnerability that's present on my future application. I'd like to build it but I can't manage to... I have joined the source code that you can get from github as an attached file (and zipped it)
I hope somebody will be able to help me and explain how to do it,
Thanks,

[NOOB] Step-by-step guide on how to build app from source?

I found an open source app that has its code hosted at GitLab, and I wanna build it for my phone myself. To be clear, this app does have a playstore version, but I wanna build it myself, for DIY's sake. I'm not strictly a developer, but I consider myself pretty knowledgable about modding and DIY-ing. So what I'm looking for is a step-by-step guide meant for beginner to intermediate users, on how to build an app from its source code.
The app I'm looking to build is called LibreTorrent. Its code is hosted here on GitLab.

Categories

Resources