Exploiting Android S-Boot: Getting Arbitrary Code Exec in the Samsung Bootloader (1/2)
Common Information
Type Value
UUID 2a26b564-f432-43f2-a32e-42fb0a3513e4
Fingerprint b629d515a173afac
Analysis status DONE
Considered CTI value 0
Text language
Published Feb. 28, 2017, 7:57 p.m.
Added to db Feb. 17, 2023, 11:53 p.m.
Last updated Sept. 4, 2024, 12:54 p.m.
Headline Hex Detective
Title Exploiting Android S-Boot: Getting Arbitrary Code Exec in the Samsung Bootloader (1/2)
Detected Hints/Tags/Attributes 39/1/1
Attributes
Details Type #Events CTI Value
Details File 3
sboot.bin