Skip to content
  • Announcements regarding our community

    0 Topics
    0 Posts
    No new posts.
  • A place to talk about whatever you want

    12 Topics
    14 Posts
    L

    Fix permissions (only if ownership/ACLs got messed up)

    This restores Admin control (do this only if normal admin methods fail).

    Open CMD as Administrator, then run:

    takeown /f C:\Windows\System32\drivers\etc\hosts icacls C:\Windows\System32\drivers\etc\hosts /grant Administrators:F
  • Got a question? Ask away!

    0 Topics
    0 Posts
    No new posts.
  • Blog posts from individual members

    11 Topics
    17 Posts
    M

    Although tools such as MobSF may flag it as this as a mis-configuration, it can be exploited even with a device that does not have root per mission. This mis-config can be used to create a full backup copy of the whole device including the application data that is supposed to only be accessed by root user.

    c8f0acdf-297c-4516-aaf8-532ffa8b8dfa-image.png

    For this i was able to demonstrate a PoC for the issue using bash script that i wrote to try and exploit the mis-configuration.

    d4894181-a1d0-43ad-9ac3-f98d2d979a65-image.png

    This illustrates how one application with such a misconfiguration could result to the compromise of the whole device

    96a1b799-2e14-4d70-9acd-2bc5fbc4e6d6-image.png

    By allowing this action this means all application data can be backup.

    46258240-1de7-4070-b980-4c7cfaa979d0-image.png

    Example of data that can be pulled

    198c606d-1b42-4c25-a69f-1e3d66691fec-image.png

    what are some of the steps that can be taken in this particular case. Its quite simple
    The flag [android:allowBackup] should be set to false

    Happy Hacking