Mobile Application Security Labs
Vector
Store your precious embeddings IN-THE-KERNEL cause userspace too slow. Features: fast lookups, zero OOBs, a destructor that you'll never use and more.
Outline
Outline
This challenge contains a custom vulnerable Android kernel driver with a memory corruption vulnerability, which can be exploited on Android 15 with kernel version 6.6.46.
Objective
Your goal is to escalate your privileges and obtain the flag located at
/data/vendor/secret/flag.txt, and provide the flag and exploitation steps to proof you cracked this challenge.
Validate your exploit against the local debug environment first; port it to the Corellium device only after successful validation on debug environment.
Skills Required
Validate your exploit against the local debug environment first; port it to the Corellium device only after successful validation on debug environment.
Skills Required
- Kernel debugging
- Familiar with kernel drivers and memory corruption bugs
- Proficiency in reverse engineering techniques for analyzing and understanding code.

Course Lessons
Copyright © 2024
Company
Mobile Hacking Lab B.V.
Registration:
97390453
VAT:
NL868032281B01
Registration:
97390453
VAT:
NL868032281B01