-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
所以有大佬可以给一个能复现的demo吗 #61
Comments
老设备无力抵抗,遍地开花 |
你去看机型对应的AlivePullStartup 和AlivePullStartUpImpl 与 CommonAlivePullStartUp就能知道该咋利用了。重要的也就这几个文件。调用链在往上都是一些接口类没啥值得看的。而AlivePullStartUpImpl是整个调用的核心,通过他才能让整个恶意代码开始工作。 AlivePullStartUpImpl 里的这个方法是调用恶意代码运行的。 private IManuAlivePullStartUp getManuAlivePullStartUp() { |
AlivePullStartUpImpl我也看了好久, 有几个比较关键的方法。
|
反编译代码然后按照代码的思路写一份然后运行不就知道效果了, 光看没啥用要写代码然后编译运行。 |
您这边复现了吗,我通过AlivePullStartUpImpl获得bundle,但是我卡在context上了,仿佛context并没有获得提权 |
No description provided.
The text was updated successfully, but these errors were encountered: