Exploiting Android S-Boot: Getting Arbitrary Code Exec in the Samsung Bootloader (1/2)
Tags
attack-pattern: | Data Direct Firmware - T1592.003 Python - T1059.006 Server - T1583.004 Server - T1584.004 Software - T1592.002 Tool - T1588.002 |
Common Information
Type | Value |
---|---|
UUID | 2a26b564-f432-43f2-a32e-42fb0a3513e4 |
Fingerprint | b629d515a173afac |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Feb. 28, 2017, 7:57 p.m. |
Added to db | Feb. 17, 2023, 11:53 p.m. |
Last updated | Sept. 4, 2024, 12:54 p.m. |
Headline | Hex Detective |
Title | Exploiting Android S-Boot: Getting Arbitrary Code Exec in the Samsung Bootloader (1/2) |
Detected Hints/Tags/Attributes | 39/1/1 |
Source URLs
URL Provider