First I have to ask that everyone please follow the rules when posting in here.
The last thread was shut down due to people getting off topic so let's stay on track here, if you have a question that you'd like to ask and are unsure if it b...
ES File Explorer
The app I use is mainly for File browsing, but I've noticed with the new versi...
This is for firmware 17.1.2.A.314
1. Root with this: https://t.co/C9odPof7Cl (Reference: http://forum.xda-developers.com/showthread.php?t=2559009) Donate
2. Install this Recovery: http://nut.xperia-files.com/?dlid=WjItbG9ja2VkZHVhbHJlY292ZXJ5Mi4...
To speed things up someone might want to post /system/lib/libui.so to make sure it's not altered by Samsung...etc. The GraphicBuffer is used in that lib.
After loading up libui.so into IDA, I CAN NOT find any traces of it being patched.
So from a de-compile of libui.so we can see that the function we need to focus our exploit on is located between 0x5cf8 - 0x5e04. It's called 'GraphicBuffer::unflatten'.
Within this function we can cause an integer over flow. Now I'm not an exp...