Updating readme and adding some necessary binaries to run the exploit
This commit is contained in:
parent
ac9b7630b9
commit
5154096998
16
README.md
16
README.md
@ -2,6 +2,8 @@
|
||||
Code to exploit and research the Exynos Bootrom.
|
||||
|
||||
## Setting up
|
||||
|
||||
### Python module
|
||||
Create a venv, and intall ghidra_assistant.
|
||||
```bash
|
||||
python3 -m venv venv
|
||||
@ -9,6 +11,16 @@ python3 -m venv venv
|
||||
pip install -r requirements.txts
|
||||
```
|
||||
|
||||
To get to work, run `source/exploit/exploit.py`
|
||||
### Building the debugger
|
||||
The debugger needs to be built using [gupje](https://git.herreweb.nl/EljakimHerrewijnen/Gupje). Move the contents of `source/gupje_device` to `Gupje/devices/samsung_s7`. Then proceed to build the debugger.
|
||||
|
||||
To view documentation, ensure you have sphinx installed. If not, run `sudo apt install python3-sphinx`. Then proceed to build the documentation by running `make livehtml`.
|
||||
```bash
|
||||
mv source/gupje_device/* {your-gupje-root}/devices/samsung_s7
|
||||
cd {your-gupje-root}
|
||||
make -f devices/samsung_s7/Makefile
|
||||
```
|
||||
|
||||
Then proceed to move the debugger to `dump/debugger.bin`. To get to work, run `source/exploit/exploit.py`. The launch.json's are located in source/exploit, so its recommended to open this folder in your VSCode/favourite IDE.
|
||||
|
||||
### Viewing/building documentation
|
||||
To view documentation, ensure you have sphinx installed. If not, run `sudo apt install python3-sphinx`. Then proceed to build the documentation by running `make livehtml` in `documentation`.
|
BIN
dump/debugger.bin
Executable file
BIN
dump/debugger.bin
Executable file
Binary file not shown.
BIN
dump/reloc_debugger.bin
Executable file
BIN
dump/reloc_debugger.bin
Executable file
Binary file not shown.
@ -11,3 +11,4 @@ tqdm
|
||||
pyhidra
|
||||
sphinxcontrib.confluencebuilder
|
||||
sphinxcontrib.drawio
|
||||
source/ghidra_assistant/ghidra_assistant-0.0.1-py3-none-any.whl
|
BIN
source/exploit/stage1/entry.o
Normal file
BIN
source/exploit/stage1/entry.o
Normal file
Binary file not shown.
BIN
source/exploit/stage1/stage1.bin
Executable file
BIN
source/exploit/stage1/stage1.bin
Executable file
Binary file not shown.
BIN
source/exploit/stage1/stage1.elf
Executable file
BIN
source/exploit/stage1/stage1.elf
Executable file
Binary file not shown.
BIN
source/exploit/stage1/stage1.o
Normal file
BIN
source/exploit/stage1/stage1.o
Normal file
Binary file not shown.
BIN
source/ghidra_assistant/ghidra_assistant-0.0.1-py3-none-any.whl
Normal file
BIN
source/ghidra_assistant/ghidra_assistant-0.0.1-py3-none-any.whl
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user