On Apr 13, 2012, at 10:45 AM, William Enck wrote: > > The sendGzByBrowser() and sendByBrowser() just take the acquired information > and include it in a URL passed to the Web Browser. This method of > exfiltrating data is well known (Tim includes a link on implementing a root > shell using this method).
Sorry, I meant a "remote" shell (https://viaforensics.com/security/nopermission-android-app-remote-shell.html). -Will -- William Enck Assistant Professor Department of Computer Science North Carolina State University Email: e...@cs.ncsu.edu Web: http://www.enck.org -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To post to this group, send email to android-security-discuss@googlegroups.com. To unsubscribe from this group, send email to android-security-discuss+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.