2024-11-25 17:40:39 +01:00
2024-11-12 17:44:35 +01:00
2024-11-21 21:39:30 +01:00
2024-11-25 13:58:05 +01:00
2024-08-17 20:35:52 +02:00
2024-08-20 15:23:50 +02:00
2024-08-23 08:27:08 +00:00

Samsung_S7

Code to exploit and research the Exynos Bootrom.

Setting up

Python module

Create a venv, and intall ghidra_assistant.

python3 -m venv venv
. venv/bin/activate
pip install -r requirements.txts

Building the debugger

The debugger needs to be built using gupje. Move the contents of source/gupje_device to Gupje/devices/samsung_s7. Then proceed to build the debugger.

mv source/gupje_device/* {your-gupje-root}/devices/samsung_s7
cd {your-gupje-root}
make -f devices/samsung_s7/Makefile

Then proceed to move the debugger to dump/debugger.bin. To get to work, run source/exploit/exploit.py. The launch.json's are located in source/exploit, so its recommended to open this folder in your VSCode/favourite IDE.

Viewing/building documentation

To view documentation, ensure you have sphinx installed. If not, run sudo apt install python3-sphinx. Then proceed to build the documentation by running make livehtml in documentation.

Pushing documentation to confluence

Run sphinx-build -b confluence source _build/confluence from documentation/ to push docs to confluence. They will appear in the DT_Sphinx space. If running issues, be sure to remove the '_build' folder and try again!

Description
Code to exploit and research the Exynos Bootrom
Readme 73 MiB
Languages
Python 72.5%
C 13.3%
Makefile 10.4%
Assembly 2.6%
Shell 1.2%