View Single Post
Old 08-16-2022, 01:40 AM   #4
inexplicable_ham
Junior Member
inexplicable_ham began at the beginning.
 
inexplicable_ham's Avatar
 
Posts: 3
Karma: 10
Join Date: Aug 2022
Device: PW5
Quote:
Originally Posted by NiLuJe View Post
The main issue is getting code execution, privilege escalation is (usually) far "easier" (once upon a time because what flaws we found were already in stuff running as a privileged user ;p).
I see, in which case I can dig around for code execution! Do you have any tips? I figure since the kernel is from 2018, it's likely there's going to be a library or dependency somewhere that's old enough to be vulnerable to something for which POCs already exist. Have people already gone through metasploit and exploitdb for these?

I'm going to look for stuff related to file formats, the browser, bluetooth, and email as a first pass. If there's nothing obvious then I'll have to walk all the way over to my laptop and probe for running services...

I'm not an experienced hacker and I just like making my devices work on my terms rather than someone else's, so I don't know how far I'll get. Hopefully I'm not embarrassing myself in my naivete!
inexplicable_ham is offline   Reply With Quote