Quote:
Originally Posted by SenorClean
OK so I got the image mounted (diagrootfs.img in this case) in Ubuntu server and had a poke around.
Here is the output of 'tree' - https://pastebin.com/yHdEpGhW
There are some 'interesting' files in the root directory:
bin
dev
etc
INTERNAL_FEATURES_ENABLED__DO_NOT_RELEASE
lib
lost+found
mnt
MNTUS_EXEC
opt
PRE_GM_DEBUGGING_FEATURES_ENABLED__REMOVE_AT_GMC
proc
sbin
sys
system
usr
var
I'm not really sure what I'm looking at now...
|
That is a build of Lab126's (factory) diagnostic - which for an Androidized firmware is the initramFS.
I.E: They took out the "dual boot" system of two system roots ("main" and "Diags") and just took the original (older, dual boot) initramFS and created all of the "Diags" (new and improved, right!) into what used to be the initramfs.
BIG NOTE: The above is all supposition on my part, but it seems to be consistent with the development direction that Lab126 is taking.
I have been at this C.S. game since 1962, but I could easily guess wrong.
- - - - -
If this image can be loaded somehow on a PW4, there should be a number of usable attack vectors.
Of course, I do not want to give any of this away in public.