AcollectionofscriptsusedtoautomaticallyextractAndroidfirmwareimagesandprocessthemforATcommands.Thesescriptsmaybemodifiedforothertasks,suchasextractingspecificfilesormerelyextractingbasefilesystemimages.
Thescriptsaredividedintodirectoriesbasedontheirfunction.RefertotheREADMEscontainedineachdirectoryforusageinstructionsandmoredetailedinformation.
extract:containscodeforextractingATcommandsfromAndroidfirmwareimagesinteract:containscodetospawnashellforinteractivelysendingATcommandstophonesandobservingthereturnedresponsessend:containscodeforautomatedtestingofalargenumberofATcommandsonaphysicalphone,withallresponsesrecordedinalogfileusbswitch:containscodeforswitchingadevicetoanalternateUSBconfigurationandenablingthemodeminterfaceForquestionscontactthefirst,second,orthirdauthorviaemail.
IfyoubaseanyacademicworkoffofATCMD,pleaseciteourpaper:
@inproceedings{tian18,author={Dave(Jing)TianandGrantHernandezandJosephI.ChoiandVanessaFrostandChristieRualesandPatrickTraynorandHayawardhVijayakumarandLeeHarrisonandAmirRahmatiandMichaelGraceandKevinR.B.Butler},title={ATtentionSpanned:ComprehensiveVulnerabilityAnalysisof{AT}CommandswithintheAndroidEcosystem},booktitle={27th{USENIX}SecuritySymposium({USENIX}Security18)},year={2018},address={Baltimore,MD},url={https://www.usenix.org/conference/usenixsecurity18/presentation/tian},publisher={{USENIX}Association},}
评论