Vulnerability hunting

Revision as of 00:49, 9 August 2010 by Wikiadmin (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

This is a very hard way. you need to do reverse engineering of all motorola bootloaders

For more information see here:

Security in Motorola Droid family

Boot chain


Here you can find useful things for the IDA Pro for droid reverse engineering:

Here you can find latest IDA databases of thease bootloaders