Thanks a lot for all your responses.
And btw is it so that all services/activities within the system partition
only have a temporary privilege escalation to root? Or is there anything on
the system partition like some daemons all the time running as root? And if
not, is this done as a conscious
Ok 'mount' via terminal gives permission denied. seems good
On Wed, Aug 3, 2011 at 9:01 AM, patrick Immling pimml...@googlemail.comwrote:
Thanks a lot for all your responses.
And btw is it so that all services/activities within the system partition
only have a temporary privilege escalation
FYI the last time I elevated access to a device I did it with a simple
command-line app - no apk wrapper. (Saved it to a writable directory on
/data and ran it from adb shell.)
There isn't anything inherently more secure about the lower level interfaces
to prevent someone from writing an exploit
On Wednesday, August 3, 2011 4:01:39 AM UTC-4, patrick Immling wrote:
@Chris: So the ONLY way exploits gets into the Android is by means of Apps.
No, not at all. Most are initially done using adb. A few have been done via
web pages and the like.
Or to elaborate, even native exploits are
On Wednesday, August 3, 2011 4:13:21 AM UTC-4, patrick Immling wrote:
Ok 'mount' via terminal gives permission denied. seems good
In this case, probably yes.
But permission denied is one of the few error messages some versions of the
android toolbox package knows, and it uses it for almost
Dear All,
As I understand, the Apps residing in /data are not allowed to SUID. Only
the /system partition files can do this. Isn't it?
And the way to break down the Android is to rip through the security barrier
is to find a way to compromise it is through a privilege escalation.
I was just
On Tue, 2 Aug 2011 10:02:01 +0200
patrick Immling pimml...@googlemail.com wrote:
And the way to break down the Android is to rip through the security barrier
is to find a way to compromise it is through a privilege escalation.
The main thing attackers need root for is to hide a backdoor or