Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-0781 PoC — Android 安全漏洞

Source
Associated Vulnerability
Title:Android 安全漏洞 (CVE-2017-0781)
Description:Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。 Android中的Bluetooth Network Encapsulation Protocol(BNEP)服务存在远程代码执行漏洞,该漏洞源于程序没有充分的验证授权。远程攻击者可利用该漏洞执行代码。以下版本受到影响:Android 4.4.4版本,5.0.2版本,5.1.1版本,6.0版本,6.0.1版本,7.0版本,7.1.1版本,7.1.2版本,8.0版本。
Description
BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities.  Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found.  Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3).  Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found.  Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip  For more details on BlueBorne, you may read the full technical white paper available here:  https://www.armis.com/blueborne/  In addition a several detailed blog posts on the exploitation of these vulnerability can be found here:  https://www.armis.com/blog/  ===============  Dependencies:
Readme
# Blue-Borne
BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities.  Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found.  Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3).  Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found.  Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip  For more details on BlueBorne, you may read the full technical white paper available here:  https://www.armis.com/blueborne/  In addition a several detailed blog posts on the exploitation of these vulnerability can be found here:  https://www.armis.com/blog/  ===============  Dependencies:
File Snapshot

[4.0K] /data/pocs/4b3d4583938cf7a3d173d796f75ba47966da3b6f ├── [4.0K] android │   ├── [1.1K] bluedroid.py │   ├── [1.2K] btsock.py │   ├── [2.2K] connectback.py │   ├── [7.2K] doit.py │   ├── [1.3K] README.md │   ├── [4.6K] sdp.py │   └── [1.3K] utils.py ├── [ 38K] blueborne-master.zip ├── [4.0K] l2cap_infra │   ├── [ 20K] l2cap_infra.py │   ├── [ 667] pcap_file.py │   ├── [ 443] README.md │   └── [1.1K] traced_bt_user_sock.py ├── [1.2K] LICENSE └── [ 948] README.md 2 directories, 14 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.