|
@alephsecurity | |||||
|
Exploiting Qualcomm EDL Programmers: Memory & Storage based attacks allowing PBL extraction, rooting, secure boot bypassing & bootloader chain debugging/tracing. Multiple Qualcomm based mobile devices affected (5-part blog post)
alephsecurity.com/2018/01/22/qua…
|
||||||
|
||||||
|
Dylanger Daly
@DylangerDaly
|
22. sij 2018. |
|
This still requires the OEM's Signed Firehose to be leaked, on top of this, some newer versions of Firehose will not allow peek/poke if Secure Boot is Enabled.
|
||
|
|
||
|
the grugq
@thegrugq_ebooks
|
22. sij 2018. |
|
I don't think its that useful...
|
||
|
|
||
|
the grugq
@thegrugq_ebooks
|
26. sij 2018. |
|
I guess, from old data here, is that they added a special hack for FBI access which was the problem.
|
||
|
|
||
|
Von oben nach unten
@fratien
|
31. sij 2018. |
|
For years, the unlocks mobile boxes have been using this technique to Unbrick phones..and more. Not new.
|
||
|
|
||