Samsung_S7/documentation/_build/confluence/index.conf

112 lines
3.0 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<p>Documentation on Samsung devices, currently mainly the Samsung S7. Here were exploiting the Exynos 8890, which is present on both the Samsung S7 and the MIB3 High (VAG).</p><p style="clear: both;">BootROMs:</p>
<ul>
<li>
<ac:link>
<ri:page ri:content-title="Start/Home" />
<ac:link-body>Start/Home</ac:link-body>
</ac:link><ul>
<li>
<ac:link ac:anchor="Protections">
<ri:page ri:content-title="Start/Home" />
<ac:link-body>Protections</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="SamsungFirmware">
<ri:page ri:content-title="Start/Home" />
<ac:link-body>Samsung Firmware</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="MemoryLayout">
<ri:page ri:content-title="Start/Home" />
<ac:link-body>Memory Layout</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="Downloadprotocol">
<ri:page ri:content-title="Start/Home" />
<ac:link-body>Download protocol</ac:link-body>
</ac:link></li>
</ul>
</li>
<li>
<ac:link>
<ri:page ri:content-title="Frederics Exploit" />
<ac:link-body>Frederics Exploit</ac:link-body>
</ac:link><ul>
<li>
<ac:link ac:anchor="USBStackinBootROM">
<ri:page ri:content-title="Frederics Exploit" />
<ac:link-body>USB Stack in BootROM</ac:link-body>
</ac:link></li>
</ul>
</li>
<li>
<ac:link>
<ri:page ri:content-title="Exploit boot chain" />
<ac:link-body>Exploit boot chain</ac:link-body>
</ac:link><ul>
<li>
<ac:link ac:anchor="Generaloverview">
<ri:page ri:content-title="Exploit boot chain" />
<ac:link-body>General overview</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="Debuggers">
<ri:page ri:content-title="Exploit boot chain" />
<ac:link-body>Debuggers</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="Stage1-Initialexploit">
<ri:page ri:content-title="Exploit boot chain" />
<ac:link-body>Stage 1 - Initial exploit</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="Stage2-BL1">
<ri:page ri:content-title="Exploit boot chain" />
<ac:link-body>Stage 2 - BL1</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="Stage3-BL31">
<ri:page ri:content-title="Exploit boot chain" />
<ac:link-body>Stage 3 - BL31</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="Stage4-BL2">
<ri:page ri:content-title="Exploit boot chain" />
<ac:link-body>Stage 4 - BL2</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="Stage5-BL33">
<ri:page ri:content-title="Exploit boot chain" />
<ac:link-body>Stage 5 - BL33</ac:link-body>
</ac:link></li>
</ul>
</li>
<li>
<ac:link>
<ri:page ri:content-title="Notes" />
<ac:link-body>Notes</ac:link-body>
</ac:link><ul>
<li>
<ac:link ac:anchor="Emulator">
<ri:page ri:content-title="Notes" />
<ac:link-body>Emulator</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="BL1peculiarities">
<ri:page ri:content-title="Notes" />
<ac:link-body>BL1 peculiarities</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="Week35-2024">
<ri:page ri:content-title="Notes" />
<ac:link-body>Week 35 - 2024</ac:link-body>
</ac:link></li>
<li>
<ac:link ac:anchor="Week36-2024">
<ri:page ri:content-title="Notes" />
<ac:link-body>Week 36 - 2024</ac:link-body>
</ac:link></li>
</ul>
</li>
</ul>