Difference between revisions of "Vulnerability hunting"
From MILEDROPEDIA
(Created page with 'This is a very hard way. you need to do reverse engineering of all motorola bootloaders For more information see here: Security in Motorola Droid family [[boot:b…') |
m (moved Custom rom:exploit to Vulnerability hunting) |
(No difference)
|
Revision as of 18:59, 12 August 2010
This is a very hard way. you need to do reverse engineering of all motorola bootloaders
For more information see here:
Security in Motorola Droid family
Here you can find useful things for the IDA Pro for droid reverse engineering: http://gitorious.org/droid/ida
Here you can find latest IDA databases of thease bootloaders http://gitorious.org/droid/reversed