Exploiting H/PC Pro 3.0 - Windows CE's unseen legacyHandheld PC News Posted 3 years ago | News | Chris Tilley 2 comments
![]() Most users of computing devices seldom giving the very real need to understand application security much credence. The same is true for most Windows CE users, who, since 1996 have without much more than a second glance consumed tools, apps and utilities from the Internet without much thought to the quality and security profile of those programs.
If Windows CE had been more popular, hadn't faded into obscurity and had become more ubiquitous like its Win32 counterpart. How would history have recorded the security profile and security efforts of those few who chose to develop for the platform? In an interesting, if technical series of articles. Elias Augusto has been taking a look at the practicalities of performing a low level buffer exploit against H/PC Pro 3.0 under the SH3 architecture. Using a couple of apps from the SCL here on HPC:Factor, Elias goes on to develop the exploit attack and subsequently works towards making it a fully demonstrable proof of concept. It isn't an easy read if you are not a security researcher or hacker, however Elias's article offers a fascinating view into the world of security research, offering a clear insight into the intricacies and hurdles experienced in creating such exploits. His work leaves the topic open to some interesting thinking on just how well written these early apps were as well as what might exploits still might be possible were modern thinking and attack techniques being readily applied against the H/PC. For simplicity, the articles in the series up to the current time are linked below or you can visit Elias's blog directly to view the latest developments.
View: Elias Augusto's Blog Posted on 04 February 2020 at 10:27By Chris Tilley (C:Amie)
Comments on this articleMost of his blog is over my head, but it seems his best efforts at creating a wince 2.1 hack/exploit failed...am I correct in that? So, it appears to be a more secure platform than one might think given its creation so long ago.!! is that what you are saying??? The Jornada 680 I had way back when just didn't seem powerful enough...but perhaps I just didn't know about HPCFactor at the time. When I acquired used J720's later and this site, with programs and drivers, it seemed a different story. WEP wifi being the most obvious security weakness I have been aware of... |
Jake