Well, yesterday I took the plunge, pushed rage.bin to my phone and ran it. What a nice little fork bomb, took about 15 minutes! Now when I run adb shell I get a nice little hash mark prompt Haven't uploaded su/busybox or Superuser.apk but that will come.
I'm somewhat curious though, how much of a sandbox does Dalvik run in? Any chance the same local root exploit that gave me root could be executed by a (non native) app to do something evil? I'm guessing that rage.bin is native code and not Dalvik bytecode...
I'm somewhat curious though, how much of a sandbox does Dalvik run in? Any chance the same local root exploit that gave me root could be executed by a (non native) app to do something evil? I'm guessing that rage.bin is native code and not Dalvik bytecode...