Security/B2G/RootingTools: Difference between revisions

From MozillaWiki
< Security‎ | B2G
Jump to navigation Jump to search
(new)
 
(ART feature description added)
Line 1: Line 1:
= Objective =
= Objective =
The purpose of this document is to collect Android rooting tools, and to evaluate them for use in FxOS platform security testing.
The purpose of this document is to collect Android rooting tools, and to evaluate their potential for aiding us in FxOS platform security testing.
 
= Criteria list =
= Criteria list =
Each tool is evaluated by a set of criteria chosen to provide a quick overview of the tool's capabilities and opportunities for integration into existing environments.
Each tool is evaluated by a set of criteria chosen to provide a quick overview of the tool's capabilities and opportunities for integration into existing environments.
Line 27: Line 28:
== Android Rooting Tools ==
== Android Rooting Tools ==
=== Summary ===
=== Summary ===
Collection of local Android root exploits and tools to engineer them. Exploit parameters (memory locations etc.) are collected in a per-device database.
Collection of local Android root exploits and tools to engineer, port, and maintain them. Exploit parameters (memory locations etc.) are collected in a per-device database.
 
=== Criteria ===
=== Criteria ===
{|
{|
Line 38: Line 40:
| Programming language || C, sql, ARM ELF binaries
| Programming language || C, sql, ARM ELF binaries
|-
|-
| License              || none
| License              || partly none, partly GPL3
|-
|-
| Operating system    || prevalently Android NDK
| Operating system    || prevalently Android NDK, some host-side maintenance code in C
|-
|-
| Current version      || (git: 2014-01-27)
| Current version      || (git: 2014-01-27)
Line 47: Line 49:
|}
|}
=== Features ===
=== Features ===
=== Applications ===
The Android Rooting Tools project is actively maintained. Work on the github repository is seeing ongoing and frequent contributions by several github users, so chances are high that the project will not be abandoned soon.
 
Its device database currently lists 186 devices, but at this point it's unclear whether this means that there's a working exploit for all of them.
 
The list of attempted exploits is:
 
* acdb
* fj_hdcp
* msm_cameraconfig
* put_user
* fb_mem
* perf_swevent
* diag_exploit
 
=== Links ===
=== Links ===

Revision as of 16:01, 4 February 2014

Objective

The purpose of this document is to collect Android rooting tools, and to evaluate their potential for aiding us in FxOS platform security testing.

Criteria list

Each tool is evaluated by a set of criteria chosen to provide a quick overview of the tool's capabilities and opportunities for integration into existing environments.

Homepage
Code
Target user group
Programming language
License
Operating system
Current version
Interface

Links to check out

Projects

Android Rooting Tools

Summary

Collection of local Android root exploits and tools to engineer, port, and maintain them. Exploit parameters (memory locations etc.) are collected in a per-device database.

Criteria

Homepage https://github.com/android-rooting-tools
Code https://github.com/android-rooting-tools
Target user group rooters, pentesters
Programming language C, sql, ARM ELF binaries
License partly none, partly GPL3
Operating system prevalently Android NDK, some host-side maintenance code in C
Current version (git: 2014-01-27)
Interface Shell

Features

The Android Rooting Tools project is actively maintained. Work on the github repository is seeing ongoing and frequent contributions by several github users, so chances are high that the project will not be abandoned soon.

Its device database currently lists 186 devices, but at this point it's unclear whether this means that there's a working exploit for all of them.

The list of attempted exploits is:

  • acdb
  • fj_hdcp
  • msm_cameraconfig
  • put_user
  • fb_mem
  • perf_swevent
  • diag_exploit

Links