首页
社区
课程
招聘
[转帖]Dissecting a MediaTek BootROM exploit
发表于: 2021-2-1 17:02 2178

[转帖]Dissecting a MediaTek BootROM exploit

2021-2-1 17:02
2178

Dissecting a MediaTek BootROM exploit

A bricked Xiaomi phone led me to discover a project in Github that uses a MediaTek BootROM exploit that was undocumented. The exploit was found by Xyz, and implemented by Chaosmaster. The initial exploit was already available for quite a while. Since I have managed to revive my phone, I am documenting my journey to revive it and also explains how the exploit works. This exploit allows unsigned code execution, which in turn allows us to read/write any data from our phone.


For professionals: you can just skip to how the BootROM exploit works (spoiler: it is very simple). This guide will try to guide beginners so they can add support for their own phones. I want to show everything but it will violate MediaTek copyright, so I will only snippets of decompilation of the boot ROM.

a83K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6@1K9h3&6&6K9r3q4U0K9#2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3U0q4Q4x3V1j5H3x3g2)9J5c8U0x3I4i4K6u0r3k6r3W2K6M7$3g2U0N6r3W2F1k6#2)9J5k6r3q4Q4x3X3c8E0k6h3c8A6j5i4c8W2K9#2)9J5k6r3u0G2L8%4c8J5L8$3#2Q4x3X3c8W2P5s2m8D9L8$3W2@1i4K6u0r3



[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 2
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回