Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Exploit just does nothing on zenphone 2 laser #107

Open
J0SH1X opened this issue Jun 17, 2024 · 3 comments
Open

Exploit just does nothing on zenphone 2 laser #107

J0SH1X opened this issue Jun 17, 2024 · 3 comments

Comments

@J0SH1X
Copy link

J0SH1X commented Jun 17, 2024

tmp/dirtycow /data/local/tmp/run-as /system/bin/run-as <
WARNING: linker: /data/local/tmp/dirtycow: unsupported flags DT_FLAGS_1=0x8000001
dcow /data/local/tmp/run-as /system/bin/run-as
warning: source file size (14112) and destination file size (14192) differ
will append 80 zero bytes to source

[] size 14192
[
] mmap 0x7fb0210000
[] currently 0x7fb0210000=10102464c457f
[
] using /proc/self/mem method
[] check thread starts, address 0x7fb0210000, size 14192
[
] madvise thread starts, address 0x7fb0210000, size 14192

@J0SH1X
Copy link
Author

J0SH1X commented Jun 17, 2024

Android 6.0.1 December 1st 2016

Kernel 3.10.49

@timwr
Copy link
Owner

timwr commented Jun 19, 2024

I assume this was patched in December 2016.
Can you try:
make test

@J0SH1X
Copy link
Author

J0SH1X commented Jun 21, 2024

I already got the phone unlocked and rooted, as far as i know it was patched in 5th Dezember 2016 the phone was on 1st december

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants