Skip to content

crosbreaker/sh1ttyexec

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 

Repository files navigation

sh1ttyexec

Exploit allowing for code execution on keyrolled chromebooks with kernel version 6.


Guide written by Lxrd, copied from the crosbreaker discord, and reformatted for GitHub. message link

if you need any support join the discord

  1. fanxql is
  2. Powerwash the device
  3. Start enrolling the device then open powerwash menu (ctrl+alt+shift+r) on the enrollment screen not the please wait and wait till it crashes back to OOBE
  4. Try enrolling again but the moment enrollment starts (the screen that says enrollment, not please wait) esc+refresh+power (it's timing sensitive so don’t expect to get it first try), and you are done, block_devmode is set to 0 and you can do BadRecovery unverified, which can help facilitate exploits/unenrollments like quicksilver on keyrolled devices (kv6). To enter an unverified recovery image, esc+refresh+power then ctrl+d and enter, esc+refresh+power again and plug in a USB stick.

Long explanation:
This is due to the fact that when you enroll you go through state determination and if you crash back to oobe and try to enroll again, state determination happens a second time. As a result, it tries to clear fwmp but it can’t because the tpm is locked, however it does set block_devmode in vpd to 0. Shortly after, it sets it back to 1 but we can simply restart or enter recovery menu before it is able to. This allows us to boot unverified recovery images and gain/lead to code execution via badrecovery unverified. Soon, a modified recovery image called Recomm3r will be released that will act as a GUI based replacement for Sh1mmer on keyrolled devices.


This was patched in v143


Video tutorial:
https://drive.google.com/file/d/1Z4Lv82w_QGy-TTdSvdMAu0gf8NOJyKfx/view

Credits:
Lxrd for finding the vulnerability
Crosbreaker/Wininit, testing
Wininit, Video
Olyb, badrecovery unverified.
Con, having aura
Carbon, Scottie, and DMD, recomm3r
Crossjbly/xz8f, finding that the powerwash keybind allows us to crash back to oobe more easily/effectively.

About

Exploit allowing for code execution on keyrolled chromebooks with kernel version 6

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •