Quote:
Originally Posted by Averagekindlefan
webkit ver is from 2009-10. 531.2 is the ver. all the exploits i could find were atleast 3 years newer. maybe i could use mesquite and break out of the sbx
|
I've done some security research on the Kindle for Amazon's bug bounty program. As you say you're not going to find any working exploits for Amazon's webkit implementation since its so old. You're better off looking into old Webkit CVEs and writing your own exploit.
I wouldn't bother emulating the device in QEMU. The kindle ships with gdb/gdbserver on the device which you can use to debug the browser, assuming you have set up telnet/ssh access.
After that you will need to escape the (relatively weak) browser sandbox and escalate to root. If you have specific questions feel free to reach out but I'm not looking into the kindle much anymore and may not be very timely to respond. Good luck!