Editing Bugs
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 99: | Line 99: | ||
17:17:50.356427000 (System no longer locked up) Console Regains Control (74 byte packet sent) | 17:17:50.356427000 (System no longer locked up) Console Regains Control (74 byte packet sent) | ||
17:17:50.357555000 Contacts Crashlog Server / System Operation Resumes | 17:17:50.357555000 Contacts Crashlog Server / System Operation Resumes | ||
=== Sandbox Exploitation === | |||
For some reason the system fails to perform any checks/verify certain sys library's before installing them. This allows you to replace those library files with your own binary. The system will install your packaged binary to the HDD as if it were a regular update. In order to run this binary, you need to meet all the requirements listed below. | |||
''Running your own code in sandbox requires 4 things:'' | |||
1.''Disabling SHA-1 Checksums'' '''✔''' | |||
useSha1Checksums = "false" | |||
OR | |||
-Change SHA-1 checksums to match modified pkg | |||
2.''Generate a valid signature/disable or bypass signature authentication'' '''✖''' | |||
Hash of container + Magic Number form signature | |||
-Hash can be computed from modified files | |||
-Magic Number = '''''???''''' | |||
3.''Repacking Containers'' '''✔''' | |||
Lib pkg not signed or encrypted. You can modify everything as long as you don't change the structure. | |||
4.''Crafting proper binary'' '''✔''' | |||
Binary files in sandbox aren't signed or encrypted. | |||
If you use the proper version of the compiler (Get the ver info from the original binarys) you | |||
can craft a binary that's accepted as valid. | |||
Assuming you can get code running disabling sandboxing is trivial. | |||
=== Leap second 23:59:60 bug === | === Leap second 23:59:60 bug === |