Android su Privilege Escalation...

- AV AC AU C I A
发布: 2019-03-07
修订: 2025-04-13

This Metasploit module uses the su binary present on rooted devices to run a payload as root. A rooted Android device will contain a su binary (often linked with an application) that allows the user to run commands as root. This module will use the su binary to execute a command stager as root. The command stager will write a payload binary to a temporary directory, make it executable, execute it in the background, and finally delete the executable. On most devices the su binary will pop-up a prompt on the device asking the user for permission.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息