View Single Post
Old 09-16-2023, 05:01 PM   #14
dcs
Junior Member
dcs began at the beginning.
 
Posts: 1
Karma: 10
Join Date: Sep 2023
Device: Kindle 10
Quote:
Originally Posted by Averagekindlefan View Post
webkit ver is from 2009-10. 531.2 is the ver. all the exploits i could find were atleast 3 years newer. maybe i could use mesquite and break out of the sbx
I've done some security research on the Kindle for Amazon's bug bounty program. As you say you're not going to find any working exploits for Amazon's webkit implementation since its so old. You're better off looking into old Webkit CVEs and writing your own exploit.

I wouldn't bother emulating the device in QEMU. The kindle ships with gdb/gdbserver on the device which you can use to debug the browser, assuming you have set up telnet/ssh access.

After that you will need to escape the (relatively weak) browser sandbox and escalate to root. If you have specific questions feel free to reach out but I'm not looking into the kindle much anymore and may not be very timely to respond. Good luck!
dcs is offline   Reply With Quote