Difference between revisions of "Vulnerability hunting"

From MILEDROPEDIA
Jump to: navigation, search
Line 1: Line 1:
 
This is a very hard way.
 
This is a very hard way.
you need to do reverse engineering of all motorola bootloaders
+
you need to do reverse engineering of all Motorola boot loaders
  
 
For more information see here:  
 
For more information see here:  
Line 6: Line 6:
 
[[security|Security in Motorola Droid family]]
 
[[security|Security in Motorola Droid family]]
  
[[boot:boot_chain|Boot chain]]
+
[[Booting chain|Boot chain]]
  
 
[[tools:disassembling|Disassembling]]
 
[[tools:disassembling|Disassembling]]
Line 12: Line 12:
 
Here you can find useful things for the IDA Pro for droid reverse engineering: http://gitorious.org/droid/ida
 
Here you can find useful things for the IDA Pro for droid reverse engineering: http://gitorious.org/droid/ida
  
Here you can find latest IDA databases of thease bootloaders http://gitorious.org/droid/reversed
+
Here you can find latest IDA databases of these boot loaders http://gitorious.org/droid/reversed

Revision as of 03:20, 14 August 2010

This is a very hard way. you need to do reverse engineering of all Motorola boot loaders

For more information see here:

Security in Motorola Droid family

Boot chain

Disassembling

Here you can find useful things for the IDA Pro for droid reverse engineering: http://gitorious.org/droid/ida

Here you can find latest IDA databases of these boot loaders http://gitorious.org/droid/reversed