Re: [android-security-discuss] Native Exploit

2011-08-03 Thread patrick Immling
Thanks a lot for all your responses. And btw is it so that all services/activities within the system partition only have a temporary privilege escalation to root? Or is there anything on the system partition like some daemons all the time running as root? And if not, is this done as a conscious

Re: [android-security-discuss] Native Exploit

2011-08-03 Thread patrick Immling
Ok 'mount' via terminal gives permission denied. seems good On Wed, Aug 3, 2011 at 9:01 AM, patrick Immling pimml...@googlemail.comwrote: Thanks a lot for all your responses. And btw is it so that all services/activities within the system partition only have a temporary privilege escalation

Re: [android-security-discuss] Native Exploit

2011-08-03 Thread Disconnect
FYI the last time I elevated access to a device I did it with a simple command-line app - no apk wrapper. (Saved it to a writable directory on /data and ran it from adb shell.) There isn't anything inherently more secure about the lower level interfaces to prevent someone from writing an exploit

Re: [android-security-discuss] Native Exploit

2011-08-03 Thread Chris Stratton
On Wednesday, August 3, 2011 4:01:39 AM UTC-4, patrick Immling wrote: @Chris: So the ONLY way exploits gets into the Android is by means of Apps. No, not at all. Most are initially done using adb. A few have been done via web pages and the like. Or to elaborate, even native exploits are

Re: [android-security-discuss] Native Exploit

2011-08-03 Thread Chris Stratton
On Wednesday, August 3, 2011 4:13:21 AM UTC-4, patrick Immling wrote: Ok 'mount' via terminal gives permission denied. seems good In this case, probably yes. But permission denied is one of the few error messages some versions of the android toolbox package knows, and it uses it for almost

[android-security-discuss] Native Exploit

2011-08-02 Thread patrick Immling
Dear All, As I understand, the Apps residing in /data are not allowed to SUID. Only the /system partition files can do this. Isn't it? And the way to break down the Android is to rip through the security barrier is to find a way to compromise it is through a privilege escalation. I was just

Re: [android-security-discuss] Native Exploit

2011-08-02 Thread Kevin Chadwick
On Tue, 2 Aug 2011 10:02:01 +0200 patrick Immling pimml...@googlemail.com wrote: And the way to break down the Android is to rip through the security barrier is to find a way to compromise it is through a privilege escalation. The main thing attackers need root for is to hide a backdoor or