Nytro Posted July 21, 2013 Report Posted July 21, 2013 Android exploitation primers: lifing the veilon mobile offensive security (Vol. I)Table of Contents1 Overview............................................................................................................ 11.1 On the usefulness of information leak vulnerabilities .............................................. 12 Technical Details................................................................................................. 22.1 Motivation............................................................................................................. 22.2 Pre-4.1 information leak exploitation ..................................................................... 32.3 Post-4.1 information leak exploitation .................................................................... 72.4 Building your ROP chain dynamically.................................................................... 72.4.1 Searching for the gadgets ................................................................................. 72.4.2 Building the ROP chain ................................................................................... 92.4.3 Identifying the Android version and JavaScript engine............................................. 92.5 Case study: Leveraging CVE-2010-4577 ................................................................. 112.5.1 The bug ...................................................................................................... 112.5.2 Exploitation walk-through............................................................................... 142.6 Mitigation ........................................................................................................... 172.7 Future work ......................................................................................................... 173 Closing words................................................................................................... 193.1 Lessons learned.................................................................................................... 193.2 To mobile device and so?ware vendors ................................................................. 193.3 An open le?er for the exploit market..................................................................... 20References .............................................................................................................. 26Download:https://subreption.com/site_media/uploads/reports/droidleak_release.pdf Quote