User:Chipmunk: Difference between revisions

From Somewhat Obscure Computing
Jump to navigationJump to search
No edit summary
sboot doesnt actually have symbols afaik, it just has lots of logging with format strings with function parameters... also j3 prime seems unlockable via param partition
Line 6: Line 6:


Some things I aim to do eventually:
Some things I aim to do eventually:
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my <s>Verizon Galaxy Core Prime</s> (probably not vulnerable!), AT&T Galaxy S5, and AT&T Samsung Gear S (vulnerability is questionable due to the different boot image format).
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my AT&T Galaxy S5 (currently borrowed), and AT&T Samsung Gear S (vulnerability is questionable due to the different boot image format).
* Reverse engineer Samsung's reactivation lock (<code>libterrier.so</code>?) and document it (that's where the 'obscure' in 'Somewhat Obscure Computing' comes from - I doubt this feature is well documented!).
* Reverse engineer Samsung's reactivation lock (<code>libterrier.so</code>?) and document it (that's where the 'obscure' in 'Somewhat Obscure Computing' comes from - I doubt this feature is well documented!).
* Figure out the 'sboot' file format, and how the included symbols come into play
* Use [https://i.blackhat.com/USA-20/Wednesday/us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Exploiting-Samsung-Secure-Boot.pdf an exploit] to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible).
* Use [https://i.blackhat.com/USA-20/Wednesday/us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Exploiting-Samsung-Secure-Boot.pdf an exploit] to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible).
* Port an EFI implementation to an x86 phone (Asus Z00D).
* Port an EFI implementation to an x86 phone (Asus Z00D).
* Look into unlock methods for various phones... (I own too many).
* Look into unlock methods for various phones... (I own too many).

Revision as of 18:24, 28 June 2025

Hello.

I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.

Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.

Some things I aim to do eventually:

  • Port galaxy_s5_dev_tree_appended_bug to my AT&T Galaxy S5 (currently borrowed), and AT&T Samsung Gear S (vulnerability is questionable due to the different boot image format).
  • Reverse engineer Samsung's reactivation lock (libterrier.so?) and document it (that's where the 'obscure' in 'Somewhat Obscure Computing' comes from - I doubt this feature is well documented!).
  • Use an exploit to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible).
  • Port an EFI implementation to an x86 phone (Asus Z00D).
  • Look into unlock methods for various phones... (I own too many).