Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Target device hard-reset when connecting MVT adb session #407

Open
thedeadliestcatch opened this issue Oct 12, 2023 · 3 comments
Open

Target device hard-reset when connecting MVT adb session #407

thedeadliestcatch opened this issue Oct 12, 2023 · 3 comments
Labels
android question Further information is requested

Comments

@thedeadliestcatch
Copy link

Working with one device I experienced an immediate hard reset (reboot) as soon as mvt established the adb connection and started the collection process.

Has this been experienced under any circumstances by anyone analyzing a real-world compromised device?

@Te-k
Copy link
Contributor

Te-k commented Oct 12, 2023

Not that I know of. I have seen some spyware check if adb is enable and remove themselves in that case, but I doubt that a hard reset would be a good strategy. Could you do the check with modules one by one and see if a specific module is provoking the hard reset? I have seen some phones reboots in the past because some tools were exhausting their memory but mvt is pretty light generally

@thedeadliestcatch
Copy link
Author

BY hard-reset I meant an interaction-free reboot, no userdata loss perceivable.

It is definitely something any post-exploitation kit will do (if developed properly). I will check again module by module. This was observed once, and then never again. Afterwards no IOCs were found.

How does mvt currently handle things like potential baseband compromise or partition alterations? I haven't gone deep into it, but I think it doesn't handle those cases (per limitations of adb possibly).

@Te-k
Copy link
Contributor

Te-k commented Oct 30, 2023

How does mvt currently handle things like potential baseband compromise or partition alterations? I haven't gone deep into it, but I think it doesn't handle those cases (per limitations of adb possibly).

It doesn't really, but some data collected could have information about that (like dumsys or processes running).
You can see the list of modules here and we are open to add more if you have any suggestions (as long as it is doable through adb)

@Te-k Te-k added question Further information is requested android labels Oct 30, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
android question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants