Difference between revisions of "Vulnerability hunting"

From MILEDROPEDIA
Jump to: navigation, search
(Created page with 'This is a very hard way. you need to do reverse engineering of all motorola bootloaders For more information see here: Security in Motorola Droid family [[boot:b…')
 
(No difference)

Revision as of 18:59, 12 August 2010

This is a very hard way. you need to do reverse engineering of all motorola bootloaders

For more information see here:

Security in Motorola Droid family

Boot chain

Disassembling

Here you can find useful things for the IDA Pro for droid reverse engineering: http://gitorious.org/droid/ida

Here you can find latest IDA databases of thease bootloaders http://gitorious.org/droid/reversed