View Single Post
Old 01-17-2012, 12:32 PM   #97
geekmaster
Carpe diem, c'est la vie.
geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.
 
geekmaster's Avatar
 
Posts: 6,433
Karma: 10773670
Join Date: Nov 2011
Location: Multiverse 6627A
Device: K1 to PW3
Quote:
Originally Posted by ixtab View Post
As far as I understood, yifanlu has an idea about K4NT. I cannot be of any help with that device. So yeah, let's keep a stack of possible exploits for later, and keep looking for others while we have full access
I did tell yifanlu the details of my payload destination and trigger methods, but he may have found others as well, and he should soon be able to test whatever he may have found in the gpl source code now that he ordered a K4NT.

The K4NT should have even more possible payload destinations than are found in the Touch, because root is writable by default on the K4NT (no need to do "mntroot rw" despite the warning after shell login). I only tested this on the version 4.0, so it still needs to be tested on 4.0.1.

I have not looked for additional exploits after discovering that the K4NT root is writable. Perhaps we should inject the developer key directly with the tar bug without relying on a script (in case the script execution gets disabled).

Clearly, the Touch MP3 exploit has come and gone and it is time to use the next one (your locale payload injected with the tar bug). I will defer to yifanlu's judgement about when the time is right to use each of the remaining known exploits.

Last edited by geekmaster; 01-17-2012 at 12:51 PM.
geekmaster is offline   Reply With Quote