They are installing it on a running build where the adb shell runs as root, hence they already have one form of root access which they are using to create a more convenient form.
A 'secured' android device ships with the adb shell _not_ running as root. On Mar 31, 1:50 pm, teddy hong <[email protected]> wrote: > Nope. They insert d modify such binary to gain root access as I understand > On Mar 31, 2011 12:23 AM, "appel" <[email protected]> wrote:> That > requires that you already have root privileges. I don't see any > exploit. > > > -- > > You received this message because you are subscribed to the Google Groups > > "Android Security Discussions" group.> To post to this group, send email to > > [email protected].> To unsubscribe from this group, > send email to > > [email protected].> For more options, > visit this group at > > http://groups.google.com/group/android-security-discuss?hl=en. > > -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.
