This video shows an successful exploit chain of Stagefright (to get remote code execution) and Drammer (to gain root privileges). For more details, visit the Drammer project page at vusec.net/drammer
Пікірлер: 13
@MikeTrieu7 жыл бұрын
pwned. nice pivot from stagefright.
@Lizardboythelazy7 жыл бұрын
Good choice of song :)
@Lizardboythelazy7 жыл бұрын
Yeah! You a RWBY fan as well?
@Lizardboythelazy7 жыл бұрын
Andris Botos You mean Volume 4?
@Lizardboythelazy7 жыл бұрын
Andris Botos I've heard it called arcs, but you may be right. I've just considored volumes seasons since they come around once a year :P
@Gandziaro6 жыл бұрын
how to remove stagefright ? cache or something ? Please answer because I think the problem is simple when no one specifically says it. Everyone shows how to infect and no one shows where to remove it after infection ?
@lanchanoinguyen29147 жыл бұрын
why that looks like lollipop or marshmallow android version but was vulnerable by stagefright while my jellybean android doesn't.
@rearden38207 жыл бұрын
Where I can download listener.py ?
@KadeOnTop7 жыл бұрын
Please Release I need root on my G4 :) Do you guys have twitter So i can keep up!
@VUSec7 жыл бұрын
Good catch. We added our twitter to the channel profile. It should appear at the bottom of the channel banner.
@Mikein2037 жыл бұрын
What does this program do?
@WebpajudoGeek7 жыл бұрын
takes control of an android device
@Lizardboythelazy7 жыл бұрын
Michael Lambert It exploits stagefright to get remote code execution, in this case by visiting a website and playing a video. Then, it uses a new vulnerability, row hammer, to get root privileges, at which point they have full control of the phone and proceed to play "Get Lucky" by daft punk at high volume.