Advertisement
Guest User

Untitled

a guest
Oct 26th, 2016
76
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.91 KB | None | 0 0
  1.  
  2. D:\Files\Tools\android-sdk-windows\platform-tools>adb push twrp.img /sdcard/recovery.img
  3. [100%] /sdcard/recovery.img
  4.  
  5. D:\Files\Tools\android-sdk-windows\platform-tools>adb push dirtycow /data/local/tmp
  6. [100%] /data/local/tmp/dirtycow
  7.  
  8. D:\Files\Tools\android-sdk-windows\platform-tools>adb push cow-exec /data/local/tmp
  9. [100%] /data/local/tmp/cow-exec
  10.  
  11. D:\Files\Tools\android-sdk-windows\platform-tools>adb shell
  12. elsa:/ $ chmod 0777 /data/local/tmp/dirtycow
  13. elsa:/ $ /data/local/tmp/dirtycow /system/bin/applypatch /data/local/tmp/cow-exec
  14. warning: new file size (13884) and file old size (165144) differ
  15.  
  16. size 165144
  17.  
  18.  
  19. [*] mmap 0x7802f97000
  20. [*] exploit (patch)
  21. [*] currently 0x7802f97000=4f44213c0a0a0a0a
  22. [*] madvise = 0x7802f97000 165144
  23. [*] madvise = 0 1048576
  24. [*] /proc/self/mem 1367343104 1048576
  25. [*] exploited 0x7802f97000=10101464c457f
  26. elsa:/ $ start flash_recovery
  27. start: must be root
  28. 1|elsa:/ $
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement