Hacking Will there be html payloads for FW 6.72 as there are for FW 5.05?

Muxi

Well-Known Member
OP
Member
Joined
Jun 1, 2016
Messages
605
Trophies
0
Age
52
XP
2,091
Country
Germany
Hi,
under FW 5.05 the exploit chain of a payload is located in a single HTML file of small size. Will this also be available for payloads under FW 6.72, or will the exploit chain run differently here?
 

Muxi

Well-Known Member
OP
Member
Joined
Jun 1, 2016
Messages
605
Trophies
0
Age
52
XP
2,091
Country
Germany
Thanks for the feedback. Is there a source where these payloads can be obtained in html? The way I see it, there are currently only payloads consisting of an html and the accompanying js data, but they are enormous in size. I would like to include the payloads for FW 6.72 in my exploit menu, which so far only works under FW 5.05. Each payload is included as a single HTML file (in a size up to max. 100 KB). I would like to implement this for FW 6.72.

Under FW 5.05 it was sufficient to load only the HEN to fully jailbreak the console. Currently, however, under FW 6.72 there are probably several instances that need to be run.

I would just like to know if there will be payloads for FW 6.72 as offered for FW 5.05 by SiStr0, stooged or xXxTheDarkProgramerxXXx, as single HTML payloads containing the entire exploit chain.
 
Last edited by Muxi,

Muxi

Well-Known Member
OP
Member
Joined
Jun 1, 2016
Messages
605
Trophies
0
Age
52
XP
2,091
Country
Germany
The same principal.
Kernel exploit + Web kit = pushing payloads via HTML

In this context I wonder how it is possible to get the current exploit on an ESP8266 module that has a flash memory of only 4 MB, as c0d3m4st4 did with its exploit host v2.84b. Looking at the data of the exploit like this, the data in the "jb" and "mira" folders already have a size that would far exceed the capacity of the ESP module. What is the magic?

2020-07-28 17_54_05-jb.jpg
 

KiiWii

Editorial Team
Editorial Team
Joined
Nov 17, 2008
Messages
16,544
Trophies
3
Website
defaultdnb.github.io
XP
26,785
Country
United Kingdom
In this context I wonder how it is possible to get the current exploit on an ESP8266 module that has a flash memory of only 4 MB, as c0d3m4st4 did with its exploit host v2.84b. Looking at the data of the exploit like this, the data in the "jb" and "mira" folders already have a size that would far exceed the capacity of the ESP module. What is the magic?

View attachment 219232

gzip.
 

Muxi

Well-Known Member
OP
Member
Joined
Jun 1, 2016
Messages
605
Trophies
0
Age
52
XP
2,091
Country
Germany
Where can I find out more about this, including how it is implemented for creating an ESP host, for example?
I have always created my ESP menus through Arduino. Is there an easy to understand guide for this?

Or is there a chance that the exploit can still be reduced to a size that it can reach the 5.05 level?
 
Last edited by Muxi,

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    Veho @ Veho: Mkay.