They are installing it on a running build where the adb shell runs as
root, hence they already have one form of root access which they are
using to create a more convenient form.

A 'secured' android device ships with the adb shell _not_ running as
root.

On Mar 31, 1:50 pm, teddy hong <[email protected]> wrote:
> Nope. They insert d modify such binary to gain root access as I understand
> On Mar 31, 2011 12:23 AM, "appel" <[email protected]> wrote:> That 
> requires that you already have root privileges. I don't see any
> exploit.
>
> > --
> > You received this message because you are subscribed to the Google Groups
>
> "Android Security Discussions" group.> To post to this group, send email to
>
> [email protected].> To unsubscribe from this group, 
> send email to
>
> [email protected].> For more options, 
> visit this group at
>
> http://groups.google.com/group/android-security-discuss?hl=en.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to