Rooting Android. Lecture 10. Security of Mobile Devices. SMD Rooting Android, Lecture 10 1/33
|
|
- Jeffry Thompson
- 5 years ago
- Views:
Transcription
1 Rooting Android Lecture 10 Security of Mobile Devices 2018 SMD Rooting Android, Lecture 10 1/33
2 Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 2/33
3 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 3/33
4 Root Linux kernel - DAC security model Root user (UID 0) - absolute power Root on Android: Bypass Android sandbox Access and modify any file Modify read-only partitions Control system services Remove system applications SMD Rooting Android, Lecture 10 4/33
5 Android Security Measures Root access not allowed on production devices Limit system processes with root permission Avoid privilege escalation SELinux - global security policy Root processes don t have unrestricted access Still have access to private data Can modify system behavior Exploit kernel vulnerability SMD Rooting Android, Lecture 10 5/33
6 Advantages of root access Debugging and reverse engineering apps System customizations Implementing special applications Firewall Full device backup Network sharing SMD Rooting Android, Lecture 10 6/33
7 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 7/33
8 User Builds ro.build.type system property user build: No diagnostics and development tools ADB daemon disabled Debugging only for apps with debuggable true No root access using shell userdebug build: Allows debugging of all apps ADB enabled SMD Rooting Android, Lecture 10 8/33
9 User Build - Demo Pixel XL m a r l i n : / $ g e t p r o p r o. b u i l d. t y p e u s e r m a r l i n : / $ getprop ro. s e c u r e 1 m a r l i n : / $ ps e f grep adb s h e l l : 4 2 : 0 5? 0 0 : 0 0 : 0 5 adbd r o o t s e c l a b e l=u : r : su : s0 m a r l i n : / $ c a t / p r o c /693/ s t a t u s Name : adbd S t a t e : S ( s l e e p i n g ) Tgid : 693 Pid : 693 PPid : 1 TracerPid : 0 Uid : Gid : Ngid : 0 FDSize : 64 Groups : [.. ] CapInh : CapPrm : CapEff : CapBnd : c0 CapAmb : Seccomp : 0 [.. ] SMD Rooting Android, Lecture 10 9/33
10 Engineering Build Allows debugging of all apps ADB enabled ro.secure = 0 ADB daemon continues to run as root Does not drop capabilities - full capability bounding set SMD Rooting Android, Lecture 10 10/33
11 Su command Obtain root shell Run command as another UID On userdebug without restarting ADB as root Default su can be used only by root (0) and shell (2000) users Sets UID and GID to 0 Commands executed from the shell inherit priviledges SMD Rooting Android, Lecture 10 11/33
12 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 12/33
13 Production Builds In production: user build ADB daemon runs as shell user No su command No system/core OS configuration No access to the kernel Rooting a device Unlocked bootloader SMD Rooting Android, Lecture 10 13/33
14 Rooting by Changing Boot or System Image 1. Write new boot image (custom kernel) eng or userdebug ro.secure, ro.debuggable Current user builds disable ADB root ADB daemon ignores properties 2. Unpack system image, write su, write system partition Would allow su access from third-party apps From Android 4.3, system mounted with nosetuid Apps cannot execute SUID programs Zygote processes without capabilities SMD Rooting Android, Lecture 10 14/33
15 Rooting by Changing Boot or System Image SELinux enforcing mode: Execute with root -> security context unchanged, MAC policy SELinux must be disabled for root access Disable security measures No system updates from the manufacturer SMD Rooting Android, Lecture 10 15/33
16 Rooting Through OTA Package OTA package - add and modify system files Without rewriting the whole OS Superuser apps: OTA package to be installed from recovery OS Manager application (updatable) SMD Rooting Android, Lecture 10 16/33
17 SuperSU OTA package and application Developed by Jorrit Chainfire Jongma Actively maintained Most popular SMD Rooting Android, Lecture 10 17/33
18 SuperSU OTA package Native binaries for arm, arm64, armv7, mips, mips64, x86, x64 Scripts for installing and starting SuperSU daemon Apk of management application Updater scripts update-binary, updater-script SMD Rooting Android, Lecture 10 18/33
19 SuperSU installation (1) Mount rootfs, system and data partitions as read-write Copy su and daemonsu to /system/xbin/ Copy apk to /system/app/ -> installed at reboot Copy install-recovery.sh to /system/etc/ SMD Rooting Android, Lecture 10 19/33
20 SuperSU installation (2) Set permissions and SELinux security labels of installed binaries u:object_r:system_file:s0 label Call /system/xbin/su --install Post-install initialization Unmount system and data partitions SMD Rooting Android, Lecture 10 20/33
21 SuperSU Initialization Samsung Galaxy S7 Edge h e r o 2 l t e : / # c a t i n i t. s u p e r s u. r c # e a r l i e s t p o s s i b l e SuperSU daemon launch, w i t h f a l l b a c k to s e r v i c e on post f s data exec u : r : supersu : s0 root root / sbin / launch daemonsu. sh post fs data # mount / data / su. img to / su on p r o p e r t y : s u k e r n e l. mount=1 mount ext4 loop@ / data / su. img / su noatime # l a u n c h SuperSU daemon s e r v i c e daemonsu / s b i n / launch daemonsu. sh s e r v i c e c l a s s l a t e s t a r t u s e r r o o t s e c l a b e l u : r : s u p e r s u : s0 o n e s h o t SMD Rooting Android, Lecture 10 21/33
22 SuperSU - Daemonsu Bypass security constraints (no capabilities, SELinux) Usage: Apps use su binary Sends commands through socket to daemonsu Executes commands as root in u:r:supersu:s0 SELinux context SMD Rooting Android, Lecture 10 22/33
23 SuperSU - Demo Samsung Galaxy S7 Edge h e r o 2 l t e : / $ ps Z LABEL USER PID PPID VSIZE RSS WCHAN PC NAME u : r : s u p e r s u : s0 r o o t s k b r e c v S daemonsu : mount : master u : r : supersu : s0 root s k b r e c v S daemonsu : master [.. ] u : r : u n t r u s t e d a p p : s0 : c512, c768 u0 a S y S e p o l l S eu. c h a i n f i r e. s u p e r s u [.. ] u : r : s h e l l : s0 s h e l l p o l l s c h e d 7 c09943a78 S su u : r : supersu : s0 root p o l l s c h e d aea78 S daemonsu : 0 : u : r : s u p e r s u : s0 r o o t p o l l s c h e d 78 d326ca78 S s u s h h e r o 2 l t e : / $ su c s l e e p 100 SMD Rooting Android, Lecture 10 23/33
24 SuperSU - Demo Run su -c sleep 100 from shell su process executes as shell, in the u:r:shell:s0 domain su sends command to daemonsu:0:24047 An instance of daemonsu created to run the command daemonsu executes as root, in u:r:supersu:s0 domain daemonsu executes starts sush to run sleep sush executes as root, in u:r:supersu:s0 domain SMD Rooting Android, Lecture 10 24/33
25 SuperSU Management Application eu.chainfire.supersu process Asks the user to grant root access when needed One time, a period, permanently White list of applications SMD Rooting Android, Lecture 10 25/33
26 Root Access on Custom ROM CyanogenMod (now LineageOS) Start su as daemon in init.superuser.rc service su_daemon /system/xbin/su --daemon Service started or stopped using persist.sys.root_access property Value root access to none, apps, adb shell, or both SMD Rooting Android, Lecture 10 26/33
27 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 27/33
28 Full Tutorial for Rooting Samsung Galaxy S7 Edge Settings -> Enable Developer Options, OEM unlocking, USB debugging Download TWRP for hero2lte (code name) Enter Download/Odin mode by pressing [Volume Down] + [Home] + [Power] Write TWRP on device using Odin (Windows) Immediately enter Recovery mode by pressing [Volume Up] + [Home] + [Power] SMD Rooting Android, Lecture 10 28/33
29 Full Tutorial for Rooting Samsung Galaxy S7 Edge In TWRP - format data partition Push SuperSU and no-verity archives to sdcard Install no-verity using TWRP Install SuperSU using TWRP Reboot - it might take a little while SMD Rooting Android, Lecture 10 29/33
30 Full Tutorial for Rooting Samsung Galaxy S7 Edge Download the latest SuperSU application Download the latest TWRP application From SuperSU, grant permissions to apps that require root adb shell -> $ su -> # SMD Rooting Android, Lecture 10 30/33
31 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 31/33
32 Bibliography Android Security Internals, Nicolay Elenkov, 2015 Android Hacker s Handbook, Joshua J. Drake, 2014 SMD Rooting Android, Lecture 10 32/33
33 Keywords Root access SELinux User build Engineering build SuperSU TWRP LineageOS SMD Rooting Android, Lecture 10 33/33
Android Bootloader and Verified Boot
Android Bootloader and Verified Boot Lecture 7 Security of Mobile Devices 2018 SMD Android Bootloader and Verified Boot, Lecture 7 1/38 Bootloader Recovery Verified Boot Bibliography SMD Android Bootloader
More informationAndroid Device Rooting Lab
SEED Labs 1 Android Device Rooting Lab Copyright c 2015-2016 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation under Award No. 1303306
More informationSEEDAndroid User Manual
SEEDAndroid User Manual Copyright 2016 Wenliang Du, Syracuse University. All rights reserved. ATTENTION: Before using the Android VM, please at least read Section 3.1 about how to release the mouse pointer.
More informationAndroid AOSP Overview. Karthik Dantu and Steve Ko
Android AOSP Overview Karthik Dantu and Steve Ko Administrivia Any issues in building? Android Build System & Source Tree Today s goal Getting to know the build system Navigating the source tree Resources
More informationGalaxy Note Root Guide. by Max Lee
Galaxy Note Root Guide by Max Lee Copyright 2012 by RootGalaxyNote.com Table of Contents How to Root Galaxy Note! [GT-N7000] Why root your Galaxy Note? How to Root Your Galaxy Note! (This is for GT-N7000
More informationUnlock bootloader samsung with odin
Unlock bootloader samsung with odin Huawei Mate 20 Tidbits: Wireless Easy Projection, HiVision details, and more. When prompted by the phone, press the Volume Up key then continue to Part 2. I have tried
More informationEnabler Manual Device-Based Anonymization
Enabler Manual Device-Based Anonymization Project name Short name 5G Enablers for Network and System Security and Resilience 5G-ENSURE Grant agreement 671562 Call Authors H2020-ICT-2014-2 TIIT: Madalina
More informationThe Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency
The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.
More informationJapan Linux Symposium Daisuke Numaguchi Tetsuo Handa Giuseppe La Tona NTT DATA CORPORATION
Japan Linux Symposium 2009 2009.10.23 Daisuke Numaguchi Tetsuo Handa Giuseppe La Tona NTT DATA CORPORATION 1. INTRODUCTIONS Copyright (C) 2009 NTT Data Corporation 2 TOMOYO overview MAC implementation
More informationAndroid Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky
Android Forensics Presented By: Mohamed Khaled Thanks to: Ibrahim Mosaad Mohamed Shawky Agenda Mobile Forensic Process Different Mobile Forensic Scenario Acquisition Guide Challenges of Android Forensics
More informationA Study of User Data Integrity During Acquisition of Android Devices
DIGITAL FORENSIC RESEARCH CONFERENCE By Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee and Kyungho Lee Presented At The Digital Forensic Research Conference DFRWS 2013 USA Monterey, CA
More informationBachelor Thesis Project. Methods for avoiding rooting in Android System
Bachelor Thesis Project Methods for avoiding rooting in Android System Author: Haofei Yan Supervisor: Morgan Ericsson External supervisor: Janne Jöhag, Ulf Pettersson Semester: VT 2017 Subject: Computer
More informationAndroid System Development Training 4-day session
Android System Development Training 4-day session Title Android System Development Training Overview Understanding the Android Internals Understanding the Android Build System Customizing Android for a
More informationClockworkmod Won't Boot Into Recovery Droid X2
Clockworkmod Won't Boot Into Recovery Droid X2 Entering and using recovery mode represents maybe the most common Android into recovery) is an official procedure, which means that you won't lose the stock
More informationEssential PH-1 (mata) Documentation
Essential PH-1 (mata) Documentation Release 1 the pink panther Aug 22, 2018 Contents 1 Prerequisites: 1 2 Unlocking the Bootloader 3 3 Working with A/B Partitioning 5 3.1 Slots...................................................
More informationInstall ADB on Windows
Android Debug Bridge or better known as ADB is a powerful and versatile tool that lets you do a lot of things like pulling out logs, installing and uninstalling apps, transferring files, rooting and flashing
More informationAndroid: Under the Hood. GDG-SG DevFest 5th Nov 2016 Jason Zaman
Android: Under the Hood GDG-SG DevFest 5th Nov 2016 Jason Zaman Overview Who am I? Android Block Diagram Mobile Hardware Filesystem Layout Startup Linux Kernel Bionic libc Ashmem / Binder IPC Zygote Dalvik
More informationPrivilege Escalation via adbd Misconfiguration
Privilege Escalation via adbd Misconfiguration 17/01/2018 Software Affected Versions CVE Reference Author Severity Vendor Vendor Response Android Open Source Project (AOSP) Android 4.2.2 to Android 8.0
More informationSysadminSG RHCSA Study Guide
SysadminSG RHCSA Study Guide This is the RHCSA Study Guide for the System Administration Study Group. The study guide is intended to be printed by those who wish to study common tasks performed by many
More informationSmartphone Security Overview
Smartphone Security Overview Jagdish Prasad Achara Speaker, Claude Castelluccia ENSIMAG, Grenoble 11 décembre 2013 J. P. Achara, C. Castelluccia (ENSIMAG, Grenoble) Smartphone Security Overview 11 décembre
More informationData Security and Privacy. Unix Discretionary Access Control
Data Security and Privacy Unix Discretionary Access Control 1 Readings for This Lecture Wikipedia Filesystem Permissions Other readings UNIX File and Directory Permissions and Modes http://www.hccfl.edu/pollock/aunix1/filepermissions.htm
More informationGalaxy S3 Mini Without Root
How To Move Apps To Sd Card On Samsung Galaxy S3 Mini Without Root How to Back Up Your Android Apps (& Their Data) Without Root How to Root ANY Samsung Galaxy S5 Variant (Even AT&T & Verizon) in 20 Seconds
More informationPESIT Bangalore South Campus
INTERNAL ASSESSMENT TEST - 2 Date : 20/09/2016 Max Marks : 0 Subject & Code : Unix Shell Programming (15CS36) Section : 3 rd Sem ISE/CSE Name of faculty : Prof Ajoy Time : 11:30am to 1:00pm SOLUTIONS 1
More informationOS Security III: Sandbox and SFI
1 OS Security III: Sandbox and SFI Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 VMs on lab machine Extension? 3 Users and processes FACT: although ACLs use users as subject, the OS
More informationViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project
ViryaOS RFC: Secure Containers for Embedded and IoT A proposal for a new Xen Project sub-project Stefano Stabellini @stabellinist The problem Package applications for the target Contain all dependencies
More informationOS security mechanisms:
OS security mechanisms: Memory Protection: One of the important aspects of Operating system security is Memory Protection. Memory provides powerful indirect way for an attacker to circumvent security mechanism,
More informationEnabler Manual Security Indicator
Enabler Manual Security Indicator Project name 5G Enablers for Network and System Security and Resilience Short name 5G-ENSURE Grant agreement 671562 Call H2020-ICT-2014-2 Authors UOXF: Ravishankar Borgaonkar
More informationAndroid Things Security Research in Developer Preview 2
1 Monthly Research 2017.2 Android Things Security Research in Developer Preview 2 E-Mail: research-feedback[at]ffri.jp Twitter: @FFRI_Research FFRI, Inc. http://www.ffri.jp/en Table of Contents Background
More informationLecture 2 PLATFORM SECURITY IN ANDROID OS
Lecture 2 PLATFORM SECURITY IN ANDROID OS You will be learning: Android as a software platform Internals and surrounding ecosystem Security techniques in Android: Application signing Application isolation
More informationCapabilities. Linux Capabilities and Namespaces. Outline. Michael Kerrisk, man7.org c 2018 March 2018
Linux Capabilities and Namespaces Capabilities Michael Kerrisk, man7.org c 2018 mtk@man7.org March 2018 Outline 4 Capabilities 4-1 4.1 Overview 4-3 4.2 Process and file capabilities 4-8 4.3 Shell commands
More informationHow To Get All Google Play Apps On Rooted Android Phones 2012
How To Get All Google Play Apps On Rooted Android Phones 2012 Each Android application can have one or multiple services. They run in the Is there a way to undo the changes this app makes to your phone?
More informationSE Linux Implementation LINUX20
SE Linux Implementation LINUX20 Russell Coker IBM eserver pseries, Linux, Grid Computing and Storage Technical University 7/7/2004 Licensed under the GPL Topic Objectives In this topic students will learn
More informationLAB #7 Linux Tutorial
Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing
More informationUser Guide Software Pdf Samsung Galaxy S2 Skyrocket
User Guide Software Pdf Samsung Galaxy S2 Skyrocket AT&T released a new software update for the Samsung Galaxy S II Skyrocket (i727) via Firmware Over the Air (FOTA) over User-Initiated Software Update.
More informationSamsung Galaxy S4 Schematics Apps To Sd Card
Samsung Galaxy S4 Schematics Apps To Sd Card Damaged Fix The Samsung Galaxy S4, model i9505, features a 13-megapixel back camera, Once rooted, there's apps that allow you to transfer your apps tonthr sd
More informationSecuring Android-Powered Mobile Devices Using SELinux
Securing Android-Powered Mobile Devices Using SELinux This paper appears in: Security & Privacy, IEEE Issue Date: May- June 2010 Volume: 8 Issue:3 On page(s): 36-44 Asaf Shabtai, Yuval Fledel, and Yuval
More informationVerizon Samsung Galaxy S3 Manual Update To Jelly Bean 4.2 1
Verizon Samsung Galaxy S3 Manual Update To Jelly Bean 4.2 1 Android 4.2.1 jelly bean update for samsung galaxy s3 verizon variant: how to install using custom rom (tutorial) - Install android 4.2.1 jelly
More informationAndroid: A Security Analysis
Mythbusters! Security means different things to different people! Closed source more secure than open source! Security could be achieved by obscurity! Software-only security is good [enough]! Security
More informationLandlock LSM: toward unprivileged sandboxing
Landlock LSM: toward unprivileged sandboxing Mickaël Salaün ANSSI September 14, 2017 1 / 21 Secure user-space software How to harden an application? secure development follow the least privilege principle
More informationSystems Programming/ C and UNIX
Systems Programming/ C and UNIX Alice E. Fischer Lecture 6: Processes October 9, 2017 Alice E. FischerLecture 6: Processes Lecture 5: Processes... 1/26 October 9, 2017 1 / 26 Outline 1 Processes 2 Process
More informationAndroid forensics. Part 1 boot process, security, system, rooting, dumping, analysis, etc.
Android forensics Part 1 boot process, security, system, rooting, dumping, analysis, etc. Android and mobile forensics Any interaction with the smartphone will change the device in some way Use judgment,
More informationLecture 3 Android Internals
Lecture 3 Android Internals This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ or
More informationPc Use Manual Pdf Samsung Galaxy S2 I9100t
Pc Use Manual Pdf Samsung Galaxy S2 I9100t Samsung Galaxy SII, GT-i9100, GT-i9100M, GT-i9100P, GT-i9100T, GT-i9100G is to connect your phone, via USB, to Samsung PC Suite, Kies and check for an update!
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 13: Operating System Security Department of Computer Science and Engineering University at Buffalo 1 Review Previous topics access control authentication session
More informationManual Install Android 4.4 On Galaxy S4 I9505 Xda
Manual Install Android 4.4 On Galaxy S4 I9505 Xda Today, Samsung started with an update to Android 5.0.1 for the BLACK-edition of the S4 (but can also installed to the "normal" S4): UPDATE: 16 mar 15 Down
More informationSecure Architecture Principles
CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from
More informationManual Android 4.3 Galaxy S3 Verizon Official Update
Manual Android 4.3 Galaxy S3 Verizon Official Update Here's an updated tutorial for rooting all Galaxy S3 models including AT&T, T-Mobile, (It will not work on Verizon S3 as it has a locked bootloader.)
More informationHow To Install Apps On Nook Color Using Adb
How To Install Apps On Nook Color Using Adb Whether you have existing apps or are starting from scratch, it's easy to get your NOOK Color runs the Android 2.2 (Froyo) operating system and works with the
More informationCritical Analysis and last hour guide for RHCSA/RHCE Enterprise 7
Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Disclaimer: I haven t gone through RHCSA/RHCE EL 7. I am preparing for upgrade of my RHCE certificate from RHCE EL4 to RHCE EL7. I don
More informationUnderstanding user namespaces
Understanding user namespaces Understanding user namespaces Michael Kerrisk, man7.org c 2018 mtk@man7.org 31 January 2018, San Jose, CA, USA Outline 1 Introduction 3 2 Some background: capabilities 6 3
More informationHow To Manually Update Note 2 To Android 4.3
How To Manually Update Note 2 To Android 4.3 Using Odin Galaxy Note 2 (N7100) - Android 4.3 Leaked Samsung Pre-Release - How to Install. 7 Parts: Before Updating to Jelly Bean, Make Sure: Rooting Your
More informationOutline. Cgroup hierarchies
Outline 15 Cgroups 15-1 15.1 Introduction to cgroups v1 and v2 15-3 15.2 Cgroups v1: hierarchies and controllers 15-17 15.3 Cgroups v1: populating a cgroup 15-24 15.4 Cgroups v1: a survey of the controllers
More informationSecure Architecture Principles
Computer Security Course. Secure Architecture Principles Slides credit: Dan Boneh What Happens if you can t drop privilege? In what example scenarios does this happen? A service loop E.g., ssh Solution?
More informationSD Card with Eclipse/Emulator
SD Card with Eclipse/Emulator Creating the SD Card "image" file (a file representation of a physical SD Card) Assume Cygwin bash shell: $ cd c: $ mkdir sdcards $ cd sdcards $ Android\android-sdk\tools\mksdcard
More informationmost elaborate jailbreak to ever hack your phone forbes Used 800,000 times in 6 hours after its release
Brian Beckerle Latest iphone jailbreak, ios 6.1 Patched in latest version ios 6.1.3 4 of 6? Exploits fixed most elaborate jailbreak to ever hack your phone forbes Used 800,000 times in 6 hours after its
More informationDepartment of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore, Karnataka
FUTURE DIRECTIONS FOR FIRMWARE FLASHING ON ANDROID DEVICES Yadunandan Laxman Huded* & S. Srinath** Department of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore,
More informationSecurity Enhanced Linux
Security Enhanced Linux Bengt Nolin beno9295@student.uu.se October 13, 2004 Abstract A very brief introduction to SELinux; what it is, what is does and a little about how it does it. 1 1 Background 1.1
More informationAzure Sphere: Fitting Linux Security in 4 MiB of RAM. Ryan Fairfax Principal Software Engineering Lead Microsoft
Azure Sphere: Fitting Linux Security in 4 MiB of RAM Ryan Fairfax Principal Software Engineering Lead Microsoft Agenda o o o o Intro to Azure Sphere Kernel Customizations User mode services / App Model
More informationHow To Flash Clockworkmod Touch Recovery 6.0 For The Galaxy S3 T999
How To Flash Clockworkmod Touch Recovery 6.0 For The Galaxy S3 T999 Update T-Mobile Galaxy S3 SGH-T999 To Android 4.4.4 KitKat With SlimKat Stable Your device have latest CWM version 6.0.4.4 and up or
More informationZBG 100 Gateway Recovery Guide Version 02 ZBG pikkerton GmbH ZBG Gateway Recovery Guide.docx Page 1/11
2015 pikkerton GmbH ZBG.docx Page 1/11 1 History DVers.: Date Modified by Changes State 01 04.06.2015 PI FG Born Release 02 13.10.2015 PI FG Update of file links Release 2015 pikkerton GmbH ZBG.docx Page
More informationCST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB
Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs
More informationLab 4 In class Hands-on Android Debugging Tutorial
Lab 4 In class Hands-on Android Debugging Tutorial Submit lab 4 as PDF with your feedback and list each major step in this tutorial with screen shots documenting your work, i.e., document each listed step.
More informationAutomated Identification of Installed Malicious Android Applications
DIGITAL FORENSIC RESEARCH CONFERENCE Automated Identification of Installed Malicious Android Applications By Mark Guido, Justin Grover, Jared Ondricek, Dave Wilburn, Drew Hunt and Thanh Nguyen Presented
More informationRoot Guide Galaxy Nexus 4.3 Toolkit Android 4.0.4
Root Guide Galaxy Nexus 4.3 Toolkit Android 4.0.4 Nexus Root Toolkit 2.0.4: February 4th, 2015 Android L-preview added, full support will be included when its officially released. Added an additional step
More informationAndroid Jelly Bean Manual Install Application On Sd Card
Android Jelly Bean Manual Install Application On Sd Card All of them except the sd card,have really low space and I can't install 2 but i can move apps to sdcard and my other fone which 4.1.2 doesnt have
More informationOutline. Cgroup hierarchies
Outline 4 Cgroups 4-1 4.1 Introduction 4-3 4.2 Cgroups v1: hierarchies and controllers 4-16 4.3 Cgroups v1: populating a cgroup 4-24 4.4 Cgroups v1: a survey of the controllers 4-38 4.5 Cgroups /proc files
More informationSeaPea v2.0 for Mac OSX 10.4.X X
##################### CLASSIFICATION: SECRET ##################### Last Updated: 11/06/08 SeaPea v2.0 for Mac OSX 10.4.X - 10.5.X Developer: IOC/EDG/AED/UDB Version: SeaPea v2.0 Introduction SeaPea is
More informationContents in Detail. Acknowledgments
Acknowledgments xix Introduction What s in This Book... xxii What Is Ethical Hacking?... xxiii Penetration Testing... xxiii Military and Espionage... xxiii Why Hackers Use Linux... xxiv Linux Is Open Source....
More informationAndroid Jelly Bean Manual Install On Pc In 10
Android Jelly Bean Manual Install On Pc In 10 Easy Steps Samsung has rolled out official update, Android 4.1.2 Jelly Bean with base firmware specific, may follow our step-by-step guide to install the update
More informationController from an updated msi found here:
Server not starting on phone Posted by danwilkerson - 2014/07/17 13:34 Like several others, I am having issues starting the server on my phone. The windows app shows to be started, but the app on my phone
More informationAdb Sideload Update Supersu V1.43 Zip
Adb Sideload Update Supersu V1.43 Zip Yes, you will keep receiving OTA updates unless you change some basic system files. If you flash a C:/miniadb_m7_adb sideload SuperSU-v1.99.zip sending:. Shield Tablet
More informationFlash Player Manually For Android Apk Descargar
Flash Player Manually For Android 2.3 4 Apk Descargar Download Install Flash Player Videos1.0 APK for Android. Install Flash Player 4 - PLAY FLASH PLAYER ON S4, NOTE 3 ANDROID 4.4, 4.3, 4.2.2 & 4.1.2 5
More information21. This is a screenshot of the Android Studio Debugger. It shows the current thread and the object tree for a certain variable.
4. Logging is an important part of debugging, which is hard to achieve on mobile devices, where application development and execution take place on different systems. Android includes a framework that
More informationSecure Architecture Principles
Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Original slides were created by Prof. John Mitchel 1 Secure
More informationG54ADM Sample Exam Questions and Answers
G54ADM Sample Exam Questions and Answers Question 1 Compulsory Question (34 marks) (a) i. Explain the purpose of the UNIX password file. (2 marks) ii. Why doesn t the password file contain passwords? (2
More informationAndroid Internals. Lecture 3. Operating Systems Practical. 19 October 2016
Android Internals Lecture 3 Operating Systems Practical 19 October 2016 This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
More informationBirds of a Feather Session - OSS Vancouver Eystein Stenberg, Mender.io
Birds of a Feather Session - OSS Vancouver 2018 Eystein Stenberg, Mender.io Typical product development process Prototyping Production design Mass production Release deadline panic Updater is too often
More informationAndroid Application Sandbox. Thomas Bläsing DAI-Labor TU Berlin
Android Application Sandbox Thomas Bläsing DAI-Labor TU Berlin Agenda Introduction What is Android? Malware on smartphones Common countermeasures on the Android platform Use-Cases Design Conclusion Summary
More informationSecure Architecture Principles
CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from
More informationAccess Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.
Access Control CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Access Control Describe the permissions available to computing processes
More informationAndroid security enforcements
Android security enforcements Hello DroidCon! Javier Cuesta Gómez Android Engineer manager @Grab Android 2017 security 450 reports $1.1 payout The most difficult OWASP security risks: Unintended data leakage
More informationPrivilege Escalation
Privilege Coleman Kane Coleman.Kane@ge.com February 9, 2015 Security Vulnerability Assessment Privilege 1 / 14 root, or Privilege or Elevation is the act of gaining access to resources which were intended
More informationCONCEPTES AVANÇATS DE SISTEMES OPERATIUS
CONCEPTES AVANÇATS DE SISTEMES OPERATIUS Facultat d'informàtica de Barcelona, Dept. d'arquitectura de Computadors, curs 2016/2017 2Q Pràctiques de laboratori Android and Linux Objectives In this laboratory
More informationSandboxing. (1) Motivation. (2) Sandboxing Approaches. (3) Chroot
Sandboxing (1) Motivation Depending on operating system to do access control is not enough. For example: download software, virus or Trojan horse, how to run it safely? Risks: Unauthorized access to files,
More informationOpen Lecture Mobile Programming. Command Line Tools
Open Lecture Mobile Programming Command Line Tools Agenda Setting up tools Android Debug Bridge (ADB) Gradle Setting up tools Find path of Android SDK Default paths: Windows - C:\Users\\AppData\Local\Android\sdk
More informationLinux System Administration
System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for
More informationSprint Samsung Galaxy S2 Manual Update To Jelly Bean Official
Sprint Samsung Galaxy S2 Manual Update To Jelly Bean 4.2 2 Official Update your Galaxy S2 Plus GT-I9105P to I9105PXXUBNG1 Android 4.2.2 Jelly Bean. Samsung rolled out XXUBNG1 Android 4.2.2 Jelly Bean official
More informationSurviving in the wilderness integrity protection and system update. Patrick Ohly, Intel Open Source Technology Center Preliminary version
Surviving in the wilderness integrity protection and system update Patrick Ohly, Intel Open Source Technology Center Preliminary version Motivation for the talk Why bother? Why yet another talk? What s
More informationAce S5830i With Ics Android 4.0
Instructions How To Use Samsung Galaxy Ace S5830i With Ics Android 4.0 Samsung galaxy tab plus 7.0 gt-p6200 - android rom update, Here's the manual procedure on how to upgrade the samsung galaxy tab plus
More informationBeyond Init: systemd
LinuxKongress 2010 lennart@poettering.net September 2010 Who Am I? Software Engineer at Red Hat, Inc. Developer of PulseAudio, Avahi and a few other Free Software projects http://0pointer.de/lennart/ lennart@poettering.net
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 9L0-064 Title : OS X v10.8 Troubleshooting Exam Vendors : Apple Version : DEMO 1 /
More informationOPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4)
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4) 1 Agenda: Lab 1 Required materials Thinking Ahead (Tips / Warnings): Importance of Command Line LVM / Host vs Virtual Machines Importance of
More informationRACF UNIXPRIV Class. SHARE August 2018 RSH CONSULTING, INC. RACF SPECIALISTS
RSH CONSULTING, INC. RACF SPECIALISTS 617 969 9050 WWW.RSHCONSULTING.COM RSH Consulting Robert S. Hansel RSH Consulting, Inc. is an IT security professional services firm established in 1992 and dedicated
More informationROM FLASHING INSTRUCTIONS FOR ONEPLUS 3 / 3T
ROM FLASHING INSTRUCTIONS FOR ONEPLUS 3 / 3T 1. Locate the red USB C cable that came with your phone, and plug your phone into the computer. The OnePlus device will automatically boot a virtual CD drive.
More informationCourse 55187B Linux System Administration
Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration
More informationVerizon Samsung Galaxy S3 Firmware Update Kies Probleme
Verizon Samsung Galaxy S3 Firmware Update Kies Probleme Problem: Hi I am hoping you can give me some direction on a problem I'm having I even thought that maybe the Verizon S3 firmware was corrupted, so
More informationCPSC 457 OPERATING SYSTEMS MIDTERM EXAM
CPSC 457 OPERATING SYSTEMS MIDTERM EXAM Department of Computer Science University of Calgary Professor: Carey Williamson March 9, 2010 This is a CLOSED BOOK exam. Textbooks, notes, laptops, calculators,
More informationECE 471 Embedded Systems Lecture 22
ECE 471 Embedded Systems Lecture 22 Vince Weaver http://www.eece.maine.edu/~vweaver vincent.weaver@maine.edu 31 October 2018 Don t forget HW#7 Announcements 1 Computer Security and why it matters for embedded
More informationHow To Manually Program A Motorola Droid Razr Maxx Hd 4.1.2
How To Manually Program A Motorola Droid Razr Maxx Hd 4.1.2 The program specifically states it will not work for Droid Razr HD. I have ver 4.1.2, 912xt, connected as media device, latest drivers from Motorola
More informationWelcome to Rootkit Country
Welcome to Rootkit Country CanSecWest 03/2011 Graeme Neilson Security Consultant & Researcher Aura Software Security graeme@aurasoftwaresecurity.co.nz Rootkit == cancerous software A rootkit is software
More information