Skip to content

mutur4/Unisoc-Exploitation

Repository files navigation

Introduction

The Z3X Pandora Box [1] is a swiss army knife when it comes to attacking Mobile Phones running different chipsets with options to read/write/format partitions and to even root devices. The tool is bundled with chained exploits and its highly protected against Reverse Engineering, using different techniques like debugger, VM & UART sniffer checks among others -- this is the curiosity that fueled this research.

In the process of "playing around" with the tool, I was able to intercept its serial (UART) USB communication with a vulnerable Unisoc device. The captured and filtered serial data is included in this repo in the provided bin files which I believe is the exploit chain that exploits (at this stage) an unknown memory corruption vulnerability present in the vulnerable device's BootROM.

A fun scary fact is that the BootROM is readonly. A memory corruption vulnz means that the bug will never be patched, as long as the device is alive & supported.

The Device Under Test (DUT) that was used in this project will not be shared, but the list of vulnerable devices that the tool supports, can be found online.

Please Note: The information shared in this project is to be used for educational purposes ONLY and I shall not be liable for any damages caused from the direct use of any tools and/or exploits from this repo.

References

About

This repo contains a custom Unisoc Flashing tool, that exploits a memory vulnz in the Unisoc BROM to bypass preloader verification. The payload was extracted from the Pandora Box Device Hacking Tool and the aim will be to decode the payload to understand the underlying vulnerability.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages