Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-0781 PoC — Android 安全漏洞

Source
Associated Vulnerability
Title:Android 安全漏洞 (CVE-2017-0781)
Description:A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.
Description
BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities.  Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found.  Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3).  Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found.  Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip  For more details on BlueBorne, you may read the full technical white paper available here:  https://www.armis.com/blueborne/  In addition a several detailed blog posts on the exploitation of these vulnerability can be found here:  https://www.armis.com/blog/  ===============  Dependencies:
Readme
# Blue-Borne
BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities.  Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found.  Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3).  Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found.  Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip  For more details on BlueBorne, you may read the full technical white paper available here:  https://www.armis.com/blueborne/  In addition a several detailed blog posts on the exploitation of these vulnerability can be found here:  https://www.armis.com/blog/  ===============  Dependencies:
File Snapshot

[4.0K] /data/pocs/4b3d4583938cf7a3d173d796f75ba47966da3b6f ├── [4.0K] android │   ├── [1.1K] bluedroid.py │   ├── [1.2K] btsock.py │   ├── [2.2K] connectback.py │   ├── [7.2K] doit.py │   ├── [1.3K] README.md │   ├── [4.6K] sdp.py │   └── [1.3K] utils.py ├── [ 38K] blueborne-master.zip ├── [4.0K] l2cap_infra │   ├── [ 20K] l2cap_infra.py │   ├── [ 667] pcap_file.py │   ├── [ 443] README.md │   └── [1.1K] traced_bt_user_sock.py ├── [1.2K] LICENSE └── [ 948] README.md 2 directories, 14 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →