Feeds

New tool jailbreaks Microsoft Surface slabs in 20 SECONDS

Bam! Run any desktop app. Pow! Samsung kills Win 8 tab

5 things you didn’t know about cloud backup

Microsoft was quick to brush off the debugging hack that allows locked-down Windows RT Surface slabs to run any unauthorised desktop software. But now the exploit has been packaged into a slick jailbreaking tool that can unlock a Redmond fondleslab in seconds.

A programmer going by the name of Netham45 has released RT Jailbreak Tool v1, a batch file that automates the Windows RT trick first revealed by security researcher C. L. Rokr.

Netham45 reckons you can jailbreak a slab in about 20 seconds just by running the runExploit.bat file on the tablet and pressing a button, although it may ask a few "self-explanatory" questions afterwards.

The hack lets users install and run any desktop software of their choosing on Microsoft's Surface tablet-laptops and any other Windows RT devices. The Redmond giant wanted punters to only use cryptographically signed apps obtained from the official Windows Store, rather than any old program compiled for RT, the ARM port of Windows 8. The jailbreak hack simply disables this security signature check.

Netham45 has published a list of desktop apps recompiled to run on hacked Windows RT devices, here and here.

Rokr's hack required the Windows Debugger with Administrator-level permissions, remotely connected to the tablet to manipulate the device's kernel memory. Specifically, the exploit injects a piece of ARM code that switches off the signature checks and briefly diverts the Windows RT kernel to run these instructions.

The RT Jailbreak tool will not permanently alter the machine, but since it is only changing a kernel variable in RAM, it must be run after rebooting or powering up the tablet if one wishes to continue using any unauthorised software.

It may also void the fondleslab's warranty and, while active, obviously allows any ARM-compatible software to run including malware if it even exists.

Microsoft earlier this week brushed off the Rokr exploit but suggested the vulnerability might be closed in a future release of Windows RT.

In fact, the Redmond giant doesn't even consider it to be a security vulnerability. The company stated: “We applaud the ingenuity of the folks who worked this out and the hard work they did to document it. We’ll not guarantee these approaches will be there in future releases.” ®

Bootnote

Samsung has iced plans for a US launch of its Qualcomm processor-powered Windows RT tablet, blaming confusion among potential customers. Company vice-president Mike Abary told Cnet at CES in Las Vegas this week that there hadn't been a "very clear positioning of what Windows RT meant in the marketplace and what it stood for relative to Windows 8". Samsung bosses think there needs to be some "heavy lifting" and "heavy investment" to educate consumers - an expensive effort that the electronics giant is unwilling to commit to.

Samsung had announced its Windows RT ATIV Tab at the IFA trade show in Berlin in August 2012. The ATIV was Samsung's Windows 8 PC, tablet and Windows Phone 8 range, and was the backwards spelling of vita, meaning "life" in Latin.

At the time, Microsoft vice-president Nick Parker, who oversees Redmond's relationship with computer manufacturers, called Samsung "a highly valued partner" and said "it’s great to see this investment in a global brand for its Windows-based Smart PCs, tablets, and phones". Er.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.