Dirty COW or otherwise called Dirty copy-on-write is a computer security vulnerability for the Linux kernel that affects all Linux based Operating Systems including Android. It is a local privilege escalation bug that exploits a race condition in the implementation of the copy-on-write mechanism in the kernel’s memory management subsystem.
It’s a privilege-escalation bug that has been present on the Linux kernel code for about 9 years. he vulnerability is present on every Linux system that uses a Linux kernel version greater than 2.6.22, which means every Android version (from Android 1.0 to 7.1.1 Nougat) can be exploited using Dirty Cow vulnerability to get root access.
So How to Hack Android using Dirty COW Exploit in 20 seconds?
Fire up any Linux Operating System that has Android NDK installed. Here, in this demo, we are using Kali.
Clone the root.zip from this link. Extract the root.sh script file in it.
Enable Developer options and USB debugging on the victim’s Android device. “Developer Settings” can be enabled in Settings>About Phone>hit the build number 7 times and then you will see Developer Settings in the bottom portion of the Settings Panel. Then, later click on it and enable USB debugging by tapping it.
Copy the root.sh script file on to the victim’s Android device’s internal storage. Then run the root.sh script by typing
Now you can check the whether if you got the root access using the command