-
Notifications
You must be signed in to change notification settings - Fork 77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
no back connect #2
Comments
what's your android Version |
Version 6.0.1 |
I have same problem. My android version is 8.1.0 |
Me neither with Android 9.0. I checked my gadget and system addr changed without reboot, so i think i did it bad. What is the method you used to get it addr? |
It works from Android 8.1 only. Comment out the below lines to double-check if you could control the PC register:
If it works right, you will see PC = 0xdeadbeeefffffffc in the crashlog in the logcat:
Only if PC was controlled, then you proceed next. If not, probably the exploit does not work on your device. |
system() and the gadget address won't change without reboot. I'm damn sure about that. |
maybe I entered the wrong code, |
You can try my updated code. It directly writes the gif file, so you don't need to manually copy. |
Where is your updated code ? |
the commande i use : |
back connect to the attacker,
I tried with my own cellphone to open a .gif file and there was no back connect
The text was updated successfully, but these errors were encountered: