Security/B2G/RootingTools: Difference between revisions
(new) |
(ART feature description added) |
||
Line 1: | Line 1: | ||
= Objective = | = Objective = | ||
The purpose of this document is to collect Android rooting tools, and to evaluate | The purpose of this document is to collect Android rooting tools, and to evaluate their potential for aiding us in FxOS platform security testing. | ||
= Criteria list = | = Criteria list = | ||
Each tool is evaluated by a set of criteria chosen to provide a quick overview of the tool's capabilities and opportunities for integration into existing environments. | Each tool is evaluated by a set of criteria chosen to provide a quick overview of the tool's capabilities and opportunities for integration into existing environments. | ||
Line 27: | Line 28: | ||
== Android Rooting Tools == | == Android Rooting Tools == | ||
=== Summary === | === Summary === | ||
Collection of local Android root exploits and tools to engineer them. Exploit parameters (memory locations etc.) are collected in a per-device database. | Collection of local Android root exploits and tools to engineer, port, and maintain them. Exploit parameters (memory locations etc.) are collected in a per-device database. | ||
=== Criteria === | === Criteria === | ||
{| | {| | ||
Line 38: | Line 40: | ||
| Programming language || C, sql, ARM ELF binaries | | Programming language || C, sql, ARM ELF binaries | ||
|- | |- | ||
| License || none | | License || partly none, partly GPL3 | ||
|- | |- | ||
| Operating system || prevalently Android NDK | | Operating system || prevalently Android NDK, some host-side maintenance code in C | ||
|- | |- | ||
| Current version || (git: 2014-01-27) | | Current version || (git: 2014-01-27) | ||
Line 47: | Line 49: | ||
|} | |} | ||
=== Features === | === Features === | ||
The Android Rooting Tools project is actively maintained. Work on the github repository is seeing ongoing and frequent contributions by several github users, so chances are high that the project will not be abandoned soon. | |||
Its device database currently lists 186 devices, but at this point it's unclear whether this means that there's a working exploit for all of them. | |||
The list of attempted exploits is: | |||
* acdb | |||
* fj_hdcp | |||
* msm_cameraconfig | |||
* put_user | |||
* fb_mem | |||
* perf_swevent | |||
* diag_exploit | |||
=== Links === | === Links === |
Revision as of 16:01, 4 February 2014
Objective
The purpose of this document is to collect Android rooting tools, and to evaluate their potential for aiding us in FxOS platform security testing.
Criteria list
Each tool is evaluated by a set of criteria chosen to provide a quick overview of the tool's capabilities and opportunities for integration into existing environments.
Homepage | |
Code | |
Target user group | |
Programming language | |
License | |
Operating system | |
Current version | |
Interface |
Links to check out
Projects
Android Rooting Tools
Summary
Collection of local Android root exploits and tools to engineer, port, and maintain them. Exploit parameters (memory locations etc.) are collected in a per-device database.
Criteria
Homepage | https://github.com/android-rooting-tools |
Code | https://github.com/android-rooting-tools |
Target user group | rooters, pentesters |
Programming language | C, sql, ARM ELF binaries |
License | partly none, partly GPL3 |
Operating system | prevalently Android NDK, some host-side maintenance code in C |
Current version | (git: 2014-01-27) |
Interface | Shell |
Features
The Android Rooting Tools project is actively maintained. Work on the github repository is seeing ongoing and frequent contributions by several github users, so chances are high that the project will not be abandoned soon.
Its device database currently lists 186 devices, but at this point it's unclear whether this means that there's a working exploit for all of them.
The list of attempted exploits is:
- acdb
- fj_hdcp
- msm_cameraconfig
- put_user
- fb_mem
- perf_swevent
- diag_exploit