On Apr 13, 2012, at 10:45 AM, William Enck wrote:
> 
> The sendGzByBrowser() and sendByBrowser() just take the acquired information 
> and include it in a URL passed to the Web Browser. This method of 
> exfiltrating data is well known (Tim includes a link on implementing a root 
> shell using this method).


Sorry, I meant a "remote" shell 
(https://viaforensics.com/security/nopermission-android-app-remote-shell.html).

-Will

-- 
William Enck
Assistant Professor
Department of Computer Science
North Carolina State University
Email: e...@cs.ncsu.edu
Web: http://www.enck.org

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to android-security-discuss@googlegroups.com.
To unsubscribe from this group, send email to 
android-security-discuss+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to