Rooting Android. Lecture 10. Security of Mobile Devices. SMD Rooting Android, Lecture 10 1/33

Size: px
Start display at page:

Download "Rooting Android. Lecture 10. Security of Mobile Devices. SMD Rooting Android, Lecture 10 1/33"

Transcription

1 Rooting Android Lecture 10 Security of Mobile Devices 2018 SMD Rooting Android, Lecture 10 1/33

2 Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 2/33

3 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 3/33

4 Root Linux kernel - DAC security model Root user (UID 0) - absolute power Root on Android: Bypass Android sandbox Access and modify any file Modify read-only partitions Control system services Remove system applications SMD Rooting Android, Lecture 10 4/33

5 Android Security Measures Root access not allowed on production devices Limit system processes with root permission Avoid privilege escalation SELinux - global security policy Root processes don t have unrestricted access Still have access to private data Can modify system behavior Exploit kernel vulnerability SMD Rooting Android, Lecture 10 5/33

6 Advantages of root access Debugging and reverse engineering apps System customizations Implementing special applications Firewall Full device backup Network sharing SMD Rooting Android, Lecture 10 6/33

7 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 7/33

8 User Builds ro.build.type system property user build: No diagnostics and development tools ADB daemon disabled Debugging only for apps with debuggable true No root access using shell userdebug build: Allows debugging of all apps ADB enabled SMD Rooting Android, Lecture 10 8/33

9 User Build - Demo Pixel XL m a r l i n : / $ g e t p r o p r o. b u i l d. t y p e u s e r m a r l i n : / $ getprop ro. s e c u r e 1 m a r l i n : / $ ps e f grep adb s h e l l : 4 2 : 0 5? 0 0 : 0 0 : 0 5 adbd r o o t s e c l a b e l=u : r : su : s0 m a r l i n : / $ c a t / p r o c /693/ s t a t u s Name : adbd S t a t e : S ( s l e e p i n g ) Tgid : 693 Pid : 693 PPid : 1 TracerPid : 0 Uid : Gid : Ngid : 0 FDSize : 64 Groups : [.. ] CapInh : CapPrm : CapEff : CapBnd : c0 CapAmb : Seccomp : 0 [.. ] SMD Rooting Android, Lecture 10 9/33

10 Engineering Build Allows debugging of all apps ADB enabled ro.secure = 0 ADB daemon continues to run as root Does not drop capabilities - full capability bounding set SMD Rooting Android, Lecture 10 10/33

11 Su command Obtain root shell Run command as another UID On userdebug without restarting ADB as root Default su can be used only by root (0) and shell (2000) users Sets UID and GID to 0 Commands executed from the shell inherit priviledges SMD Rooting Android, Lecture 10 11/33

12 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 12/33

13 Production Builds In production: user build ADB daemon runs as shell user No su command No system/core OS configuration No access to the kernel Rooting a device Unlocked bootloader SMD Rooting Android, Lecture 10 13/33

14 Rooting by Changing Boot or System Image 1. Write new boot image (custom kernel) eng or userdebug ro.secure, ro.debuggable Current user builds disable ADB root ADB daemon ignores properties 2. Unpack system image, write su, write system partition Would allow su access from third-party apps From Android 4.3, system mounted with nosetuid Apps cannot execute SUID programs Zygote processes without capabilities SMD Rooting Android, Lecture 10 14/33

15 Rooting by Changing Boot or System Image SELinux enforcing mode: Execute with root -> security context unchanged, MAC policy SELinux must be disabled for root access Disable security measures No system updates from the manufacturer SMD Rooting Android, Lecture 10 15/33

16 Rooting Through OTA Package OTA package - add and modify system files Without rewriting the whole OS Superuser apps: OTA package to be installed from recovery OS Manager application (updatable) SMD Rooting Android, Lecture 10 16/33

17 SuperSU OTA package and application Developed by Jorrit Chainfire Jongma Actively maintained Most popular SMD Rooting Android, Lecture 10 17/33

18 SuperSU OTA package Native binaries for arm, arm64, armv7, mips, mips64, x86, x64 Scripts for installing and starting SuperSU daemon Apk of management application Updater scripts update-binary, updater-script SMD Rooting Android, Lecture 10 18/33

19 SuperSU installation (1) Mount rootfs, system and data partitions as read-write Copy su and daemonsu to /system/xbin/ Copy apk to /system/app/ -> installed at reboot Copy install-recovery.sh to /system/etc/ SMD Rooting Android, Lecture 10 19/33

20 SuperSU installation (2) Set permissions and SELinux security labels of installed binaries u:object_r:system_file:s0 label Call /system/xbin/su --install Post-install initialization Unmount system and data partitions SMD Rooting Android, Lecture 10 20/33

21 SuperSU Initialization Samsung Galaxy S7 Edge h e r o 2 l t e : / # c a t i n i t. s u p e r s u. r c # e a r l i e s t p o s s i b l e SuperSU daemon launch, w i t h f a l l b a c k to s e r v i c e on post f s data exec u : r : supersu : s0 root root / sbin / launch daemonsu. sh post fs data # mount / data / su. img to / su on p r o p e r t y : s u k e r n e l. mount=1 mount ext4 loop@ / data / su. img / su noatime # l a u n c h SuperSU daemon s e r v i c e daemonsu / s b i n / launch daemonsu. sh s e r v i c e c l a s s l a t e s t a r t u s e r r o o t s e c l a b e l u : r : s u p e r s u : s0 o n e s h o t SMD Rooting Android, Lecture 10 21/33

22 SuperSU - Daemonsu Bypass security constraints (no capabilities, SELinux) Usage: Apps use su binary Sends commands through socket to daemonsu Executes commands as root in u:r:supersu:s0 SELinux context SMD Rooting Android, Lecture 10 22/33

23 SuperSU - Demo Samsung Galaxy S7 Edge h e r o 2 l t e : / $ ps Z LABEL USER PID PPID VSIZE RSS WCHAN PC NAME u : r : s u p e r s u : s0 r o o t s k b r e c v S daemonsu : mount : master u : r : supersu : s0 root s k b r e c v S daemonsu : master [.. ] u : r : u n t r u s t e d a p p : s0 : c512, c768 u0 a S y S e p o l l S eu. c h a i n f i r e. s u p e r s u [.. ] u : r : s h e l l : s0 s h e l l p o l l s c h e d 7 c09943a78 S su u : r : supersu : s0 root p o l l s c h e d aea78 S daemonsu : 0 : u : r : s u p e r s u : s0 r o o t p o l l s c h e d 78 d326ca78 S s u s h h e r o 2 l t e : / $ su c s l e e p 100 SMD Rooting Android, Lecture 10 23/33

24 SuperSU - Demo Run su -c sleep 100 from shell su process executes as shell, in the u:r:shell:s0 domain su sends command to daemonsu:0:24047 An instance of daemonsu created to run the command daemonsu executes as root, in u:r:supersu:s0 domain daemonsu executes starts sush to run sleep sush executes as root, in u:r:supersu:s0 domain SMD Rooting Android, Lecture 10 24/33

25 SuperSU Management Application eu.chainfire.supersu process Asks the user to grant root access when needed One time, a period, permanently White list of applications SMD Rooting Android, Lecture 10 25/33

26 Root Access on Custom ROM CyanogenMod (now LineageOS) Start su as daemon in init.superuser.rc service su_daemon /system/xbin/su --daemon Service started or stopped using persist.sys.root_access property Value root access to none, apps, adb shell, or both SMD Rooting Android, Lecture 10 26/33

27 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 27/33

28 Full Tutorial for Rooting Samsung Galaxy S7 Edge Settings -> Enable Developer Options, OEM unlocking, USB debugging Download TWRP for hero2lte (code name) Enter Download/Odin mode by pressing [Volume Down] + [Home] + [Power] Write TWRP on device using Odin (Windows) Immediately enter Recovery mode by pressing [Volume Up] + [Home] + [Power] SMD Rooting Android, Lecture 10 28/33

29 Full Tutorial for Rooting Samsung Galaxy S7 Edge In TWRP - format data partition Push SuperSU and no-verity archives to sdcard Install no-verity using TWRP Install SuperSU using TWRP Reboot - it might take a little while SMD Rooting Android, Lecture 10 29/33

30 Full Tutorial for Rooting Samsung Galaxy S7 Edge Download the latest SuperSU application Download the latest TWRP application From SuperSU, grant permissions to apps that require root adb shell -> $ su -> # SMD Rooting Android, Lecture 10 30/33

31 Outline Root Root Access on Different Types of Builds Root Access on Production Builds Full Rooting Tutorial Bibliography SMD Rooting Android, Lecture 10 31/33

32 Bibliography Android Security Internals, Nicolay Elenkov, 2015 Android Hacker s Handbook, Joshua J. Drake, 2014 SMD Rooting Android, Lecture 10 32/33

33 Keywords Root access SELinux User build Engineering build SuperSU TWRP LineageOS SMD Rooting Android, Lecture 10 33/33

Android Bootloader and Verified Boot

Android Bootloader and Verified Boot Android Bootloader and Verified Boot Lecture 7 Security of Mobile Devices 2018 SMD Android Bootloader and Verified Boot, Lecture 7 1/38 Bootloader Recovery Verified Boot Bibliography SMD Android Bootloader

More information

Android Device Rooting Lab

Android Device Rooting Lab SEED Labs 1 Android Device Rooting Lab Copyright c 2015-2016 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation under Award No. 1303306

More information

SEEDAndroid User Manual

SEEDAndroid User Manual SEEDAndroid User Manual Copyright 2016 Wenliang Du, Syracuse University. All rights reserved. ATTENTION: Before using the Android VM, please at least read Section 3.1 about how to release the mouse pointer.

More information

Android AOSP Overview. Karthik Dantu and Steve Ko

Android AOSP Overview. Karthik Dantu and Steve Ko Android AOSP Overview Karthik Dantu and Steve Ko Administrivia Any issues in building? Android Build System & Source Tree Today s goal Getting to know the build system Navigating the source tree Resources

More information

Galaxy Note Root Guide. by Max Lee

Galaxy Note Root Guide. by Max Lee Galaxy Note Root Guide by Max Lee Copyright 2012 by RootGalaxyNote.com Table of Contents How to Root Galaxy Note! [GT-N7000] Why root your Galaxy Note? How to Root Your Galaxy Note! (This is for GT-N7000

More information

Unlock bootloader samsung with odin

Unlock bootloader samsung with odin Unlock bootloader samsung with odin Huawei Mate 20 Tidbits: Wireless Easy Projection, HiVision details, and more. When prompted by the phone, press the Volume Up key then continue to Part 2. I have tried

More information

Enabler Manual Device-Based Anonymization

Enabler Manual Device-Based Anonymization Enabler Manual Device-Based Anonymization Project name Short name 5G Enablers for Network and System Security and Resilience 5G-ENSURE Grant agreement 671562 Call Authors H2020-ICT-2014-2 TIIT: Madalina

More information

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.

More information

Japan Linux Symposium Daisuke Numaguchi Tetsuo Handa Giuseppe La Tona NTT DATA CORPORATION

Japan Linux Symposium Daisuke Numaguchi Tetsuo Handa Giuseppe La Tona NTT DATA CORPORATION Japan Linux Symposium 2009 2009.10.23 Daisuke Numaguchi Tetsuo Handa Giuseppe La Tona NTT DATA CORPORATION 1. INTRODUCTIONS Copyright (C) 2009 NTT Data Corporation 2 TOMOYO overview MAC implementation

More information

Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky

Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky Android Forensics Presented By: Mohamed Khaled Thanks to: Ibrahim Mosaad Mohamed Shawky Agenda Mobile Forensic Process Different Mobile Forensic Scenario Acquisition Guide Challenges of Android Forensics

More information

A Study of User Data Integrity During Acquisition of Android Devices

A Study of User Data Integrity During Acquisition of Android Devices DIGITAL FORENSIC RESEARCH CONFERENCE By Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee and Kyungho Lee Presented At The Digital Forensic Research Conference DFRWS 2013 USA Monterey, CA

More information

Bachelor Thesis Project. Methods for avoiding rooting in Android System

Bachelor Thesis Project. Methods for avoiding rooting in Android System Bachelor Thesis Project Methods for avoiding rooting in Android System Author: Haofei Yan Supervisor: Morgan Ericsson External supervisor: Janne Jöhag, Ulf Pettersson Semester: VT 2017 Subject: Computer

More information

Android System Development Training 4-day session

Android System Development Training 4-day session Android System Development Training 4-day session Title Android System Development Training Overview Understanding the Android Internals Understanding the Android Build System Customizing Android for a

More information

Clockworkmod Won't Boot Into Recovery Droid X2

Clockworkmod Won't Boot Into Recovery Droid X2 Clockworkmod Won't Boot Into Recovery Droid X2 Entering and using recovery mode represents maybe the most common Android into recovery) is an official procedure, which means that you won't lose the stock

More information

Essential PH-1 (mata) Documentation

Essential PH-1 (mata) Documentation Essential PH-1 (mata) Documentation Release 1 the pink panther Aug 22, 2018 Contents 1 Prerequisites: 1 2 Unlocking the Bootloader 3 3 Working with A/B Partitioning 5 3.1 Slots...................................................

More information

Install ADB on Windows

Install ADB on Windows Android Debug Bridge or better known as ADB is a powerful and versatile tool that lets you do a lot of things like pulling out logs, installing and uninstalling apps, transferring files, rooting and flashing

More information

Android: Under the Hood. GDG-SG DevFest 5th Nov 2016 Jason Zaman

Android: Under the Hood. GDG-SG DevFest 5th Nov 2016 Jason Zaman Android: Under the Hood GDG-SG DevFest 5th Nov 2016 Jason Zaman Overview Who am I? Android Block Diagram Mobile Hardware Filesystem Layout Startup Linux Kernel Bionic libc Ashmem / Binder IPC Zygote Dalvik

More information

Privilege Escalation via adbd Misconfiguration

Privilege Escalation via adbd Misconfiguration Privilege Escalation via adbd Misconfiguration 17/01/2018 Software Affected Versions CVE Reference Author Severity Vendor Vendor Response Android Open Source Project (AOSP) Android 4.2.2 to Android 8.0

More information

SysadminSG RHCSA Study Guide

SysadminSG RHCSA Study Guide SysadminSG RHCSA Study Guide This is the RHCSA Study Guide for the System Administration Study Group. The study guide is intended to be printed by those who wish to study common tasks performed by many

More information

Smartphone Security Overview

Smartphone Security Overview Smartphone Security Overview Jagdish Prasad Achara Speaker, Claude Castelluccia ENSIMAG, Grenoble 11 décembre 2013 J. P. Achara, C. Castelluccia (ENSIMAG, Grenoble) Smartphone Security Overview 11 décembre

More information

Data Security and Privacy. Unix Discretionary Access Control

Data Security and Privacy. Unix Discretionary Access Control Data Security and Privacy Unix Discretionary Access Control 1 Readings for This Lecture Wikipedia Filesystem Permissions Other readings UNIX File and Directory Permissions and Modes http://www.hccfl.edu/pollock/aunix1/filepermissions.htm

More information

Galaxy S3 Mini Without Root

Galaxy S3 Mini Without Root How To Move Apps To Sd Card On Samsung Galaxy S3 Mini Without Root How to Back Up Your Android Apps (& Their Data) Without Root How to Root ANY Samsung Galaxy S5 Variant (Even AT&T & Verizon) in 20 Seconds

More information

PESIT Bangalore South Campus

PESIT Bangalore South Campus INTERNAL ASSESSMENT TEST - 2 Date : 20/09/2016 Max Marks : 0 Subject & Code : Unix Shell Programming (15CS36) Section : 3 rd Sem ISE/CSE Name of faculty : Prof Ajoy Time : 11:30am to 1:00pm SOLUTIONS 1

More information

OS Security III: Sandbox and SFI

OS Security III: Sandbox and SFI 1 OS Security III: Sandbox and SFI Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 VMs on lab machine Extension? 3 Users and processes FACT: although ACLs use users as subject, the OS

More information

ViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project

ViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project ViryaOS RFC: Secure Containers for Embedded and IoT A proposal for a new Xen Project sub-project Stefano Stabellini @stabellinist The problem Package applications for the target Contain all dependencies

More information

OS security mechanisms:

OS security mechanisms: OS security mechanisms: Memory Protection: One of the important aspects of Operating system security is Memory Protection. Memory provides powerful indirect way for an attacker to circumvent security mechanism,

More information

Enabler Manual Security Indicator

Enabler Manual Security Indicator Enabler Manual Security Indicator Project name 5G Enablers for Network and System Security and Resilience Short name 5G-ENSURE Grant agreement 671562 Call H2020-ICT-2014-2 Authors UOXF: Ravishankar Borgaonkar

More information

Android Things Security Research in Developer Preview 2

Android Things Security Research in Developer Preview 2 1 Monthly Research 2017.2 Android Things Security Research in Developer Preview 2 E-Mail: research-feedback[at]ffri.jp Twitter: @FFRI_Research FFRI, Inc. http://www.ffri.jp/en Table of Contents Background

More information

Lecture 2 PLATFORM SECURITY IN ANDROID OS

Lecture 2 PLATFORM SECURITY IN ANDROID OS Lecture 2 PLATFORM SECURITY IN ANDROID OS You will be learning: Android as a software platform Internals and surrounding ecosystem Security techniques in Android: Application signing Application isolation

More information

Capabilities. Linux Capabilities and Namespaces. Outline. Michael Kerrisk, man7.org c 2018 March 2018

Capabilities. Linux Capabilities and Namespaces. Outline. Michael Kerrisk, man7.org c 2018 March 2018 Linux Capabilities and Namespaces Capabilities Michael Kerrisk, man7.org c 2018 mtk@man7.org March 2018 Outline 4 Capabilities 4-1 4.1 Overview 4-3 4.2 Process and file capabilities 4-8 4.3 Shell commands

More information

How To Get All Google Play Apps On Rooted Android Phones 2012

How To Get All Google Play Apps On Rooted Android Phones 2012 How To Get All Google Play Apps On Rooted Android Phones 2012 Each Android application can have one or multiple services. They run in the Is there a way to undo the changes this app makes to your phone?

More information

SE Linux Implementation LINUX20

SE Linux Implementation LINUX20 SE Linux Implementation LINUX20 Russell Coker IBM eserver pseries, Linux, Grid Computing and Storage Technical University 7/7/2004 Licensed under the GPL Topic Objectives In this topic students will learn

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

User Guide Software Pdf Samsung Galaxy S2 Skyrocket

User Guide Software Pdf Samsung Galaxy S2 Skyrocket User Guide Software Pdf Samsung Galaxy S2 Skyrocket AT&T released a new software update for the Samsung Galaxy S II Skyrocket (i727) via Firmware Over the Air (FOTA) over User-Initiated Software Update.

More information

Samsung Galaxy S4 Schematics Apps To Sd Card

Samsung Galaxy S4 Schematics Apps To Sd Card Samsung Galaxy S4 Schematics Apps To Sd Card Damaged Fix The Samsung Galaxy S4, model i9505, features a 13-megapixel back camera, Once rooted, there's apps that allow you to transfer your apps tonthr sd

More information

Securing Android-Powered Mobile Devices Using SELinux

Securing Android-Powered Mobile Devices Using SELinux Securing Android-Powered Mobile Devices Using SELinux This paper appears in: Security & Privacy, IEEE Issue Date: May- June 2010 Volume: 8 Issue:3 On page(s): 36-44 Asaf Shabtai, Yuval Fledel, and Yuval

More information

Verizon Samsung Galaxy S3 Manual Update To Jelly Bean 4.2 1

Verizon Samsung Galaxy S3 Manual Update To Jelly Bean 4.2 1 Verizon Samsung Galaxy S3 Manual Update To Jelly Bean 4.2 1 Android 4.2.1 jelly bean update for samsung galaxy s3 verizon variant: how to install using custom rom (tutorial) - Install android 4.2.1 jelly

More information

Android: A Security Analysis

Android: A Security Analysis Mythbusters! Security means different things to different people! Closed source more secure than open source! Security could be achieved by obscurity! Software-only security is good [enough]! Security

More information

Landlock LSM: toward unprivileged sandboxing

Landlock LSM: toward unprivileged sandboxing Landlock LSM: toward unprivileged sandboxing Mickaël Salaün ANSSI September 14, 2017 1 / 21 Secure user-space software How to harden an application? secure development follow the least privilege principle

More information

Systems Programming/ C and UNIX

Systems Programming/ C and UNIX Systems Programming/ C and UNIX Alice E. Fischer Lecture 6: Processes October 9, 2017 Alice E. FischerLecture 6: Processes Lecture 5: Processes... 1/26 October 9, 2017 1 / 26 Outline 1 Processes 2 Process

More information

Android forensics. Part 1 boot process, security, system, rooting, dumping, analysis, etc.

Android forensics. Part 1 boot process, security, system, rooting, dumping, analysis, etc. Android forensics Part 1 boot process, security, system, rooting, dumping, analysis, etc. Android and mobile forensics Any interaction with the smartphone will change the device in some way Use judgment,

More information

Lecture 3 Android Internals

Lecture 3 Android Internals Lecture 3 Android Internals This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ or

More information

Pc Use Manual Pdf Samsung Galaxy S2 I9100t

Pc Use Manual Pdf Samsung Galaxy S2 I9100t Pc Use Manual Pdf Samsung Galaxy S2 I9100t Samsung Galaxy SII, GT-i9100, GT-i9100M, GT-i9100P, GT-i9100T, GT-i9100G is to connect your phone, via USB, to Samsung PC Suite, Kies and check for an update!

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 13: Operating System Security Department of Computer Science and Engineering University at Buffalo 1 Review Previous topics access control authentication session

More information

Manual Install Android 4.4 On Galaxy S4 I9505 Xda

Manual Install Android 4.4 On Galaxy S4 I9505 Xda Manual Install Android 4.4 On Galaxy S4 I9505 Xda Today, Samsung started with an update to Android 5.0.1 for the BLACK-edition of the S4 (but can also installed to the "normal" S4): UPDATE: 16 mar 15 Down

More information

Secure Architecture Principles

Secure Architecture Principles CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from

More information

Manual Android 4.3 Galaxy S3 Verizon Official Update

Manual Android 4.3 Galaxy S3 Verizon Official Update Manual Android 4.3 Galaxy S3 Verizon Official Update Here's an updated tutorial for rooting all Galaxy S3 models including AT&T, T-Mobile, (It will not work on Verizon S3 as it has a locked bootloader.)

More information

How To Install Apps On Nook Color Using Adb

How To Install Apps On Nook Color Using Adb How To Install Apps On Nook Color Using Adb Whether you have existing apps or are starting from scratch, it's easy to get your NOOK Color runs the Android 2.2 (Froyo) operating system and works with the

More information

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Disclaimer: I haven t gone through RHCSA/RHCE EL 7. I am preparing for upgrade of my RHCE certificate from RHCE EL4 to RHCE EL7. I don

More information

Understanding user namespaces

Understanding user namespaces Understanding user namespaces Understanding user namespaces Michael Kerrisk, man7.org c 2018 mtk@man7.org 31 January 2018, San Jose, CA, USA Outline 1 Introduction 3 2 Some background: capabilities 6 3

More information

How To Manually Update Note 2 To Android 4.3

How To Manually Update Note 2 To Android 4.3 How To Manually Update Note 2 To Android 4.3 Using Odin Galaxy Note 2 (N7100) - Android 4.3 Leaked Samsung Pre-Release - How to Install. 7 Parts: Before Updating to Jelly Bean, Make Sure: Rooting Your

More information

Outline. Cgroup hierarchies

Outline. Cgroup hierarchies Outline 15 Cgroups 15-1 15.1 Introduction to cgroups v1 and v2 15-3 15.2 Cgroups v1: hierarchies and controllers 15-17 15.3 Cgroups v1: populating a cgroup 15-24 15.4 Cgroups v1: a survey of the controllers

More information

Secure Architecture Principles

Secure Architecture Principles Computer Security Course. Secure Architecture Principles Slides credit: Dan Boneh What Happens if you can t drop privilege? In what example scenarios does this happen? A service loop E.g., ssh Solution?

More information

SD Card with Eclipse/Emulator

SD Card with Eclipse/Emulator SD Card with Eclipse/Emulator Creating the SD Card "image" file (a file representation of a physical SD Card) Assume Cygwin bash shell: $ cd c: $ mkdir sdcards $ cd sdcards $ Android\android-sdk\tools\mksdcard

More information

most elaborate jailbreak to ever hack your phone forbes Used 800,000 times in 6 hours after its release

most elaborate jailbreak to ever hack your phone forbes Used 800,000 times in 6 hours after its release Brian Beckerle Latest iphone jailbreak, ios 6.1 Patched in latest version ios 6.1.3 4 of 6? Exploits fixed most elaborate jailbreak to ever hack your phone forbes Used 800,000 times in 6 hours after its

More information

Department of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore, Karnataka

Department of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore, Karnataka FUTURE DIRECTIONS FOR FIRMWARE FLASHING ON ANDROID DEVICES Yadunandan Laxman Huded* & S. Srinath** Department of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore,

More information

Security Enhanced Linux

Security Enhanced Linux Security Enhanced Linux Bengt Nolin beno9295@student.uu.se October 13, 2004 Abstract A very brief introduction to SELinux; what it is, what is does and a little about how it does it. 1 1 Background 1.1

More information

Azure Sphere: Fitting Linux Security in 4 MiB of RAM. Ryan Fairfax Principal Software Engineering Lead Microsoft

Azure Sphere: Fitting Linux Security in 4 MiB of RAM. Ryan Fairfax Principal Software Engineering Lead Microsoft Azure Sphere: Fitting Linux Security in 4 MiB of RAM Ryan Fairfax Principal Software Engineering Lead Microsoft Agenda o o o o Intro to Azure Sphere Kernel Customizations User mode services / App Model

More information

How To Flash Clockworkmod Touch Recovery 6.0 For The Galaxy S3 T999

How To Flash Clockworkmod Touch Recovery 6.0 For The Galaxy S3 T999 How To Flash Clockworkmod Touch Recovery 6.0 For The Galaxy S3 T999 Update T-Mobile Galaxy S3 SGH-T999 To Android 4.4.4 KitKat With SlimKat Stable Your device have latest CWM version 6.0.4.4 and up or

More information

ZBG 100 Gateway Recovery Guide Version 02 ZBG pikkerton GmbH ZBG Gateway Recovery Guide.docx Page 1/11

ZBG 100 Gateway Recovery Guide Version 02 ZBG pikkerton GmbH ZBG Gateway Recovery Guide.docx Page 1/11 2015 pikkerton GmbH ZBG.docx Page 1/11 1 History DVers.: Date Modified by Changes State 01 04.06.2015 PI FG Born Release 02 13.10.2015 PI FG Update of file links Release 2015 pikkerton GmbH ZBG.docx Page

More information

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs

More information

Lab 4 In class Hands-on Android Debugging Tutorial

Lab 4 In class Hands-on Android Debugging Tutorial Lab 4 In class Hands-on Android Debugging Tutorial Submit lab 4 as PDF with your feedback and list each major step in this tutorial with screen shots documenting your work, i.e., document each listed step.

More information

Automated Identification of Installed Malicious Android Applications

Automated Identification of Installed Malicious Android Applications DIGITAL FORENSIC RESEARCH CONFERENCE Automated Identification of Installed Malicious Android Applications By Mark Guido, Justin Grover, Jared Ondricek, Dave Wilburn, Drew Hunt and Thanh Nguyen Presented

More information

Root Guide Galaxy Nexus 4.3 Toolkit Android 4.0.4

Root Guide Galaxy Nexus 4.3 Toolkit Android 4.0.4 Root Guide Galaxy Nexus 4.3 Toolkit Android 4.0.4 Nexus Root Toolkit 2.0.4: February 4th, 2015 Android L-preview added, full support will be included when its officially released. Added an additional step

More information

Android Jelly Bean Manual Install Application On Sd Card

Android Jelly Bean Manual Install Application On Sd Card Android Jelly Bean Manual Install Application On Sd Card All of them except the sd card,have really low space and I can't install 2 but i can move apps to sdcard and my other fone which 4.1.2 doesnt have

More information

Outline. Cgroup hierarchies

Outline. Cgroup hierarchies Outline 4 Cgroups 4-1 4.1 Introduction 4-3 4.2 Cgroups v1: hierarchies and controllers 4-16 4.3 Cgroups v1: populating a cgroup 4-24 4.4 Cgroups v1: a survey of the controllers 4-38 4.5 Cgroups /proc files

More information

SeaPea v2.0 for Mac OSX 10.4.X X

SeaPea v2.0 for Mac OSX 10.4.X X ##################### CLASSIFICATION: SECRET ##################### Last Updated: 11/06/08 SeaPea v2.0 for Mac OSX 10.4.X - 10.5.X Developer: IOC/EDG/AED/UDB Version: SeaPea v2.0 Introduction SeaPea is

More information

Contents in Detail. Acknowledgments

Contents in Detail. Acknowledgments Acknowledgments xix Introduction What s in This Book... xxii What Is Ethical Hacking?... xxiii Penetration Testing... xxiii Military and Espionage... xxiii Why Hackers Use Linux... xxiv Linux Is Open Source....

More information

Android Jelly Bean Manual Install On Pc In 10

Android Jelly Bean Manual Install On Pc In 10 Android Jelly Bean Manual Install On Pc In 10 Easy Steps Samsung has rolled out official update, Android 4.1.2 Jelly Bean with base firmware specific, may follow our step-by-step guide to install the update

More information

Controller from an updated msi found here:

Controller from an updated msi found here: Server not starting on phone Posted by danwilkerson - 2014/07/17 13:34 Like several others, I am having issues starting the server on my phone. The windows app shows to be started, but the app on my phone

More information

Adb Sideload Update Supersu V1.43 Zip

Adb Sideload Update Supersu V1.43 Zip Adb Sideload Update Supersu V1.43 Zip Yes, you will keep receiving OTA updates unless you change some basic system files. If you flash a C:/miniadb_m7_adb sideload SuperSU-v1.99.zip sending:. Shield Tablet

More information

Flash Player Manually For Android Apk Descargar

Flash Player Manually For Android Apk Descargar Flash Player Manually For Android 2.3 4 Apk Descargar Download Install Flash Player Videos1.0 APK for Android. Install Flash Player 4 - PLAY FLASH PLAYER ON S4, NOTE 3 ANDROID 4.4, 4.3, 4.2.2 & 4.1.2 5

More information

21. This is a screenshot of the Android Studio Debugger. It shows the current thread and the object tree for a certain variable.

21. This is a screenshot of the Android Studio Debugger. It shows the current thread and the object tree for a certain variable. 4. Logging is an important part of debugging, which is hard to achieve on mobile devices, where application development and execution take place on different systems. Android includes a framework that

More information

Secure Architecture Principles

Secure Architecture Principles Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Original slides were created by Prof. John Mitchel 1 Secure

More information

G54ADM Sample Exam Questions and Answers

G54ADM Sample Exam Questions and Answers G54ADM Sample Exam Questions and Answers Question 1 Compulsory Question (34 marks) (a) i. Explain the purpose of the UNIX password file. (2 marks) ii. Why doesn t the password file contain passwords? (2

More information

Android Internals. Lecture 3. Operating Systems Practical. 19 October 2016

Android Internals. Lecture 3. Operating Systems Practical. 19 October 2016 Android Internals Lecture 3 Operating Systems Practical 19 October 2016 This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.

More information

Birds of a Feather Session - OSS Vancouver Eystein Stenberg, Mender.io

Birds of a Feather Session - OSS Vancouver Eystein Stenberg, Mender.io Birds of a Feather Session - OSS Vancouver 2018 Eystein Stenberg, Mender.io Typical product development process Prototyping Production design Mass production Release deadline panic Updater is too often

More information

Android Application Sandbox. Thomas Bläsing DAI-Labor TU Berlin

Android Application Sandbox. Thomas Bläsing DAI-Labor TU Berlin Android Application Sandbox Thomas Bläsing DAI-Labor TU Berlin Agenda Introduction What is Android? Malware on smartphones Common countermeasures on the Android platform Use-Cases Design Conclusion Summary

More information

Secure Architecture Principles

Secure Architecture Principles CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from

More information

Access Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.

Access Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger. Access Control CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Access Control Describe the permissions available to computing processes

More information

Android security enforcements

Android security enforcements Android security enforcements Hello DroidCon! Javier Cuesta Gómez Android Engineer manager @Grab Android 2017 security 450 reports $1.1 payout The most difficult OWASP security risks: Unintended data leakage

More information

Privilege Escalation

Privilege Escalation Privilege Coleman Kane Coleman.Kane@ge.com February 9, 2015 Security Vulnerability Assessment Privilege 1 / 14 root, or Privilege or Elevation is the act of gaining access to resources which were intended

More information

CONCEPTES AVANÇATS DE SISTEMES OPERATIUS

CONCEPTES AVANÇATS DE SISTEMES OPERATIUS CONCEPTES AVANÇATS DE SISTEMES OPERATIUS Facultat d'informàtica de Barcelona, Dept. d'arquitectura de Computadors, curs 2016/2017 2Q Pràctiques de laboratori Android and Linux Objectives In this laboratory

More information

Sandboxing. (1) Motivation. (2) Sandboxing Approaches. (3) Chroot

Sandboxing. (1) Motivation. (2) Sandboxing Approaches. (3) Chroot Sandboxing (1) Motivation Depending on operating system to do access control is not enough. For example: download software, virus or Trojan horse, how to run it safely? Risks: Unauthorized access to files,

More information

Open Lecture Mobile Programming. Command Line Tools

Open Lecture Mobile Programming. Command Line Tools Open Lecture Mobile Programming Command Line Tools Agenda Setting up tools Android Debug Bridge (ADB) Gradle Setting up tools Find path of Android SDK Default paths: Windows - C:\Users\\AppData\Local\Android\sdk

More information

Linux System Administration

Linux System Administration System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for

More information

Sprint Samsung Galaxy S2 Manual Update To Jelly Bean Official

Sprint Samsung Galaxy S2 Manual Update To Jelly Bean Official Sprint Samsung Galaxy S2 Manual Update To Jelly Bean 4.2 2 Official Update your Galaxy S2 Plus GT-I9105P to I9105PXXUBNG1 Android 4.2.2 Jelly Bean. Samsung rolled out XXUBNG1 Android 4.2.2 Jelly Bean official

More information

Surviving in the wilderness integrity protection and system update. Patrick Ohly, Intel Open Source Technology Center Preliminary version

Surviving in the wilderness integrity protection and system update. Patrick Ohly, Intel Open Source Technology Center Preliminary version Surviving in the wilderness integrity protection and system update Patrick Ohly, Intel Open Source Technology Center Preliminary version Motivation for the talk Why bother? Why yet another talk? What s

More information

Ace S5830i With Ics Android 4.0

Ace S5830i With Ics Android 4.0 Instructions How To Use Samsung Galaxy Ace S5830i With Ics Android 4.0 Samsung galaxy tab plus 7.0 gt-p6200 - android rom update, Here's the manual procedure on how to upgrade the samsung galaxy tab plus

More information

Beyond Init: systemd

Beyond Init: systemd LinuxKongress 2010 lennart@poettering.net September 2010 Who Am I? Software Engineer at Red Hat, Inc. Developer of PulseAudio, Avahi and a few other Free Software projects http://0pointer.de/lennart/ lennart@poettering.net

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 9L0-064 Title : OS X v10.8 Troubleshooting Exam Vendors : Apple Version : DEMO 1 /

More information

OPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4)

OPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4) OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4) 1 Agenda: Lab 1 Required materials Thinking Ahead (Tips / Warnings): Importance of Command Line LVM / Host vs Virtual Machines Importance of

More information

RACF UNIXPRIV Class. SHARE August 2018 RSH CONSULTING, INC. RACF SPECIALISTS

RACF UNIXPRIV Class. SHARE August 2018 RSH CONSULTING, INC. RACF SPECIALISTS RSH CONSULTING, INC. RACF SPECIALISTS 617 969 9050 WWW.RSHCONSULTING.COM RSH Consulting Robert S. Hansel RSH Consulting, Inc. is an IT security professional services firm established in 1992 and dedicated

More information

ROM FLASHING INSTRUCTIONS FOR ONEPLUS 3 / 3T

ROM FLASHING INSTRUCTIONS FOR ONEPLUS 3 / 3T ROM FLASHING INSTRUCTIONS FOR ONEPLUS 3 / 3T 1. Locate the red USB C cable that came with your phone, and plug your phone into the computer. The OnePlus device will automatically boot a virtual CD drive.

More information

Course 55187B Linux System Administration

Course 55187B Linux System Administration Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration

More information

Verizon Samsung Galaxy S3 Firmware Update Kies Probleme

Verizon Samsung Galaxy S3 Firmware Update Kies Probleme Verizon Samsung Galaxy S3 Firmware Update Kies Probleme Problem: Hi I am hoping you can give me some direction on a problem I'm having I even thought that maybe the Verizon S3 firmware was corrupted, so

More information

CPSC 457 OPERATING SYSTEMS MIDTERM EXAM

CPSC 457 OPERATING SYSTEMS MIDTERM EXAM CPSC 457 OPERATING SYSTEMS MIDTERM EXAM Department of Computer Science University of Calgary Professor: Carey Williamson March 9, 2010 This is a CLOSED BOOK exam. Textbooks, notes, laptops, calculators,

More information

ECE 471 Embedded Systems Lecture 22

ECE 471 Embedded Systems Lecture 22 ECE 471 Embedded Systems Lecture 22 Vince Weaver http://www.eece.maine.edu/~vweaver vincent.weaver@maine.edu 31 October 2018 Don t forget HW#7 Announcements 1 Computer Security and why it matters for embedded

More information

How To Manually Program A Motorola Droid Razr Maxx Hd 4.1.2

How To Manually Program A Motorola Droid Razr Maxx Hd 4.1.2 How To Manually Program A Motorola Droid Razr Maxx Hd 4.1.2 The program specifically states it will not work for Droid Razr HD. I have ver 4.1.2, 912xt, connected as media device, latest drivers from Motorola

More information

Welcome to Rootkit Country

Welcome to Rootkit Country Welcome to Rootkit Country CanSecWest 03/2011 Graeme Neilson Security Consultant & Researcher Aura Software Security graeme@aurasoftwaresecurity.co.nz Rootkit == cancerous software A rootkit is software

More information