Skip to content

Commit 08b6739

Browse files
authored
Update README.md
1 parent ece2294 commit 08b6739

1 file changed

Lines changed: 9 additions & 9 deletions

File tree

  • src/linux-hardening/privilege-escalation

src/linux-hardening/privilege-escalation/README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1630,6 +1630,15 @@ escaping-from-limited-bash.md
16301630
cisco-vmanage.md
16311631
{{#endref}}
16321632
1633+
## Android rooting frameworks: manager-channel abuse
1634+
1635+
Android rooting frameworks commonly hook a syscall to expose privileged kernel functionality to a userspace manager. Weak manager authentication (e.g., signature checks based on FD-order or poor password schemes) can enable a local app to impersonate the manager and escalate to root on already-rooted devices. Learn more and exploitation details here:
1636+
1637+
1638+
{{#ref}}
1639+
android-rooting-frameworks-manager-auth-bypass-syscall-hook.md
1640+
{{#endref}}
1641+
16331642
## Kernel Security Protections
16341643
16351644
- [https://github.com/a13xp0p0v/kconfig-hardened-check](https://github.com/a13xp0p0v/kconfig-hardened-check)
@@ -1673,15 +1682,6 @@ cisco-vmanage.md
16731682
- [https://linuxconfig.org/how-to-manage-acls-on-linux](https://linuxconfig.org/how-to-manage-acls-on-linux)
16741683
- [https://vulmon.com/exploitdetails?qidtp=maillist_fulldisclosure\&qid=e026a0c5f83df4fd532442e1324ffa4f](https://vulmon.com/exploitdetails?qidtp=maillist_fulldisclosure&qid=e026a0c5f83df4fd532442e1324ffa4f)
16751684
- [https://www.linode.com/docs/guides/what-is-systemd/](https://www.linode.com/docs/guides/what-is-systemd/)
1676-
- [HTB Zero: .htaccess ErrorDocument LFI → argv spoofing cron abuse](https://0xdf.gitlab.io/2025/08/12/htb-zero.html)
16771685
1678-
## Android rooting frameworks: manager-channel abuse
1679-
1680-
Android rooting frameworks commonly hook a syscall to expose privileged kernel functionality to a userspace manager. Weak manager authentication (e.g., signature checks based on FD-order or poor password schemes) can enable a local app to impersonate the manager and escalate to root on already-rooted devices. Learn more and exploitation details here:
1681-
1682-
1683-
{{#ref}}
1684-
android-rooting-frameworks-manager-auth-bypass-syscall-hook.md
1685-
{{#endref}}
16861686
16871687
{{#include ../../banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)