Jump to content

Supa Mane

Supa Mane

Recommended Posts

Hey guys, 

So I've recently came across a device that has a particular scenario I've never seen before, and was hoping someone would know a proper direction for me to go in. I have an Android 4.2 (yeah, ancient) but brand new. The boot.img has been altered by the manufacturer to have adb removed, so adb isn't an option. The device opens but the settings are not accessible even after factory data reset, nor can I install to it. The only thing I have is the fact that WiFi does come on and I can have it connect to my hotspot. USB also is not available. I've recently found that this particular device has multiple exploitable vulnerabilities in regards to the WiFi driver. Now I'm not new to the command injection when it comes to metasploit and Android. However, I'll admit when I'm outta my league... And this is a bit beyond me. Does anyone know how I can ( without installing an apk) inject shellcode via a P2P connection to acquire privilege escalation?? 

Link to comment
Share on other sites


This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...