rageagainstthecage-arm5.bin - Trojan? - Epic 4G General

My Kaspersky is detecting a trojan in this rooting file:
Exploit.Linux.Lotoor.g
See attached screen-shot;
Let me know if this is in fact a false positive...?

RATC.bin is teh exploit used to root your phone...

It's a false positive. Promise.

Geniusdog254 said:
It's a false positive. Promise.
Click to expand...
Click to collapse
It's not a false positive, the exploit that we use works just like any trojan - it provides back-door access to the system. We're just using a virus to crack open the system long enough to install a more permanent access to root.
That's right, viruses aren't necessarily bad - it just depends on how they're used

It is in deed a real virus, but it won't do much to your windows system other than piss off your av software... Could jump to linux and not worry about viruses...at least very few. Yes they exist, but rarely affecting a personal computer.
Sent from my SPH-D700 using XDA App

yeah true true. virus by deffinition yes. but technically anything can be defined as a "virus" by allowing access to "alter" the original programming to allow access to functions other than what the manufacturer intended. dont worry. most antivirus's find a virus in anything. a key generator shows up as a virus. dont worry. your safe.

Kcarpenter said:
It is in deed a real virus, but it won't do much to your windows system other than piss off your av software... Could jump to linux and not worry about viruses...at least very few. Yes they exist, but rarely affecting a personal computer.
Sent from my SPH-D700 using XDA App
Click to expand...
Click to collapse
What you wrote makes no sense, the reason the anti-virus detects it as a trojan is because it includes exploit code to obtain root in LINUX. It won't do anything to a windows box but it can completely own a vulnerable linux box. So telling someone they would need to switch to linux in order to avoid this exploit is ridiculous.

correct it obtains root, but do you understand how? the whole reason it works is by exploiting adb so unless you happen to have the phone version of adb included in your linux build i would think this is pretty harmless

shabbypenguin said:
correct it obtains root, but do you understand how? the whole reason it works is by exploiting adb so unless you happen to have the phone version of adb included in your linux build i would think this is pretty harmless
Click to expand...
Click to collapse
YES, but the reason I responded to that last post was because he was telling someone to switch from windows to linux in order to avoid a linux exploit. There are plenty of valid reasons to switch, but that would have to be the stupidest one I have ever seen put forth.

shabbypenguin said:
correct it obtains root, but do you understand how? the whole reason it works is by exploiting adb so unless you happen to have the phone version of adb included in your linux build i would think this is pretty harmless
Click to expand...
Click to collapse
The exploitation of adb is used to get the RATM file on the phone... then RATM uses an exploit in the linux kernel to gain root access. I'm pretty sure RATM isn't using adb to do its magic. What I don't know, is if it is exploiting a part of the kernel that is android specific, or a part that is in every linux kernel

shabbypenguin said:
correct it obtains root, but do you understand how? the whole reason it works is by exploiting adb so unless you happen to have the phone version of adb included in your linux build i would think this is pretty harmless
Click to expand...
Click to collapse
shabbypenguin is right guys... you can't hack regular linux with this... so don't worry about it, and move on...
just be sure to reactivate your antivirus after using it.

DRockstar said:
shabbypenguin is right guys... you can't hack regular linux with this... so don't worry about it, and move on...
just be sure to reactivate your antivirus after using it.
Click to expand...
Click to collapse
styles420 said:
The exploitation of adb is used to get the RATM file on the phone... then RATM uses an exploit in the linux kernel to gain root access. I'm pretty sure RATM isn't using adb to do its magic. What I don't know, is if it is exploiting a part of the kernel that is android specific, or a part that is in every linux kernel
Click to expand...
Click to collapse
It's busting open the adb daemon on the phone, which runs as root. It'll do nothing to a desktop linux box unless you have an ARMv7 powered desktop running an Android specific kernel

Geniusdog254 said:
It's busting open the adb daemon on the phone, which runs as root. It'll do nothing to a desktop linux box unless you have an ARMv7 powered desktop running an Android specific kernel
Click to expand...
Click to collapse
Omg that's what I have I'm screwed
Sent from my Epic 4g

lol told you to upgrade to ARMv8

Tomatoe... Tomato.

Geniusdog254 said:
It's busting open the adb daemon on the phone, which runs as root. It'll do nothing to a desktop linux box unless you have an ARMv7 powered desktop running an Android specific kernel
Click to expand...
Click to collapse
That makes perfect sense, thanks for the clarification (and for not being a **** about it, as is so often a problem in the Epic forums...)

richse said:
What you wrote makes no sense, the reason the anti-virus detects it as a trojan is because it includes exploit code to obtain root in LINUX. It won't do anything to a windows box but it can completely own a vulnerable linux box. So telling someone they would need to switch to linux in order to avoid this exploit is ridiculous.
Click to expand...
Click to collapse
As has been stated, its not a linux exploit. Its an adb exploit, quit trying to associate things and sound smarter than you are. Just because your shirt is red, and your car is red doesn't mean you can drive your shirt. what I said makes perfect sense.
Sent from my SPH-D700 using XDA App

Kcarpenter said:
Just because your shirt is red, and your car is red doesn't mean you can drive your shirt.
Click to expand...
Click to collapse
Funniest thing I've read all day!

swiftdr said:
Funniest thing I've read all day!
Click to expand...
Click to collapse
Necrophilia is illegal.

k0nane said:
Necrophilia is illegal.
Click to expand...
Click to collapse
That's not what the guy running the hospital morgue told me.
I changed to NIS and it doesn't say squat about it.
Sent from my SPH-D700 using Tapatalk

Related

Apps which can brick the phone

Hi,
Today I found this document on the german website www.heise.de
This document is a threat analysis of the Android Market.
On page 9 is an overview how many apps have which permissions and there are 9 apps that can brick your phone!!
Does anybody know such an app which can brick the phone?
You should read this: http://www.zdnet.com/blog/burnette/cnet-retracts-article-on-android-app-privacy-threat/1987 and realize its all a scam to get people to buy an iphone.
They where listing one of the option as brick, anybody know if there's such option. and what it does, I doubt it would brick the phone in the real meaning...
either way anything that has a direct connection to the internet and access to your record is a potential risk, it is goog to be aware of this but pointing Android because it list such option is quite ridiculous since other OS doesn't even warn you about the fact that program can read your data...
Link: http://developer.android.com/reference/android/Manifest.permission.html
android.permission.BRICK
Required to be able to disable the device (very dangerous!).
Good lord, WIPE I could see.... BRICK!?
klausdieter79 said:
Link: http://developer.android.com/reference/android/Manifest.permission.html
android.permission.BRICK
Required to be able to disable the device (very dangerous!).
Click to expand...
Click to collapse
I think it's there in the SDK only for testing on the emulator. I'm quite sure none of the actual hardware devices would support it.. or at least I hope not
rohandhruva said:
I think it's there in the SDK only for testing on the emulator. I'm quite sure none of the actual hardware devices would support it.. or at least I hope not
Click to expand...
Click to collapse
I think it should be there, at least I have one use for it, an application to remotely lock your phone (or wipe critical information) in case of stole or lost phone. Definitely user should confirm this permission and should only do that if they completely trust the author.
bohlool said:
I think it should be there, at least I have one use for it, an application to remotely lock your phone (or wipe critical information) in case of stole or lost phone. Definitely user should confirm this permission and should only do that if they completely trust the author.
Click to expand...
Click to collapse
Remote locking is different from bricking. It makes no sense to "remotely brick" a stolen device, because then, even if you do get it back, it's useless.
But when you install the app, it has to display the permission
This application has access to the following:
Hardware controls
Brick your phone
rohandhruva said:
I think it's there in the SDK only for testing on the emulator. I'm quite sure none of the actual hardware devices would support it.. or at least I hope not
Click to expand...
Click to collapse
I'm sure there's some kind of app that can potentially brick your phone. No doubt you have to be rooted for it to have access to that ability. Clockwork ROM manager could potentially brick you're phone if you do something stupid (battery pull).
Read the permissions. Don't install what seems suspect. If the app tries to do something it doesn't have permission to do, the OS won't allow it. It's not like another app store where you have to rely on a fallible person to safeguard you.
Oh, and don't freak out when that free game you're looking at asks for internet access and your GPS location. It needs that info to serve you ads so it stays free. Don't be paranoid, nobody really cares about you, never mind enough to stalk you.
ATnTdude said:
I'm sure there's some kind of app that can potentially brick your phone. No doubt you have to be rooted for it to have access to that ability. Clockwork ROM manager could potentially brick you're phone if you do something stupid (battery pull).
Read the permissions. Don't install what seems suspect. If the app tries to do something it doesn't have permission to do, the OS won't allow it. It's not like another app store where you have to rely on a fallible person to safeguard you.
Oh, and don't freak out when that free game you're looking at asks for internet access and your GPS location. It needs that info to serve you ads so it stays free. Don't be paranoid, nobody really cares about you, never mind enough to stalk you.
Click to expand...
Click to collapse
The Clockwork ROM Manager application itself can't brick the phone - or at least it won't advertise that it can. The bricking is caused if the flashing process is interrupted, which is (strictly speaking) outside the purview of the app.
Also, what the OP found is just an ability to advertise to the user that installing this app can brick the phone. There is no mechanism by which an apk, running inside the dalvik jvm sandbox, can cause irrevocable hardware damage to the phone - at least none has been found yet.
Your last paragraph about games staying free and paranoia is just off-topic.
rohandhruva said:
The Clockwork ROM Manager application itself can't brick the phone - or at least it won't advertise that it can. The bricking is caused if the flashing process is interrupted, which is (strictly speaking) outside the purview of the app.
Also, what the OP found is just an ability to advertise to the user that installing this app can brick the phone. There is no mechanism by which an apk, running inside the dalvik jvm sandbox, can cause irrevocable hardware damage to the phone - at least none has been found yet.
Click to expand...
Click to collapse
1) You're Splitting hairs. We don't know what criteria the company that produced this study was using. Given that the whole thing was a springboard for advertising the need for their product, they're probably being more loose with the facts than you or I would. I used Clockwork as an example of how they might be interpreting the market.
2) I wasn't arguing against you. I was using your post to segue into my own. So do not take anything I said as something against your position. I, in fact, agree with your statement. I highly doubt a stock Android handset will allow you permission to brick it. I even doubt there is a root-only app that will purposefully brick your phone. I think SMobile Systems is borderline LYING to sell their unneeded product.
Your last paragraph about games staying free and paranoia is just off-topic.
Click to expand...
Click to collapse
XDA attracts a lot more than experts, many of which are not even vaguely familiar with Android permissions are, what app services might need them, nevermind the economics of the Android market. As such, given that I had in the previous sentence advised people to be critical of the permissions that apps request (I don't think most people look at them closely enough), I went the other way and told them not to be so careful as to enter the realm of paranoia. It's balanced advice and is therefore relevant to the topic.
Hopefully, this clears up any confusion. Cheers and good night...err morning, whatever you call 4AM.
ATnTdude, I don't mean to be brandishing swords or arguing.. Sorry if it seemed that way I just realised that the OP started this topic out of that stupid SMobile article. Had I read that before, I wouldn't have 'split hairs'! My bad :-/
luffyz said:
but when you install the app, it has to display the permission
this application has access to the following:
hardware controls
brick your phone
Click to expand...
Click to collapse
ahhahaha +1
@klausdieter79 Thanks for the link
I also hope it is not included in the regular phone library, I can easilly imagine someone granting this by mistake
Let's wait for someone to upload a one button app named accelerate and the only permission requested will be brick...
P00r said:
@klausdieter79 Thanks for the link
I also hope it is not included in the regular phone library, I can easilly imagine someone granting this by mistake
Let's wait for someone to upload a one button app named accelerate and the only permission requested will be brick...
Click to expand...
Click to collapse
I'm pretty much 100% certain you would have to have a rooted ROM for that to work...in which case, you probably know better than to install an app that requests permission to brick your phone
rohandhruva said:
ATnTdude, I don't mean to be brandishing swords or arguing.. Sorry if it seemed that way I just realised that the OP started this topic out of that stupid SMobile article. Had I read that before, I wouldn't have 'split hairs'! My bad :-/
Click to expand...
Click to collapse
I figured as much. It's all good.
ATnTdude said:
Oh, and don't freak out when that free game you're looking at asks for internet access and your GPS location. It needs that info to serve you ads so it stays free. Don't be paranoid, nobody really cares about you, never mind enough to stalk you.
Click to expand...
Click to collapse
OT, but I would be a little pissed if a developer was wasting my battery with GPS just to serve up targeted ads. There's no reason they couldn't use the much more battery efficient network location for that.

[PSA] Android Virus. Watch Out!

There's now an Android virus that manifests itself in the form of Trojan-SMS.AndroidOS.FakePlayer.apk and will STEAL YOUR MONEY. It sends texts to numbers that cost money to text and therefore steals money from you via your bill. Watch out. Also, go into adb and run these commands.
Code:
adb shell
cd /data/app
ls
All of your installed apps will be listed. If Trojan-SMS.AndroidOS.FakePlayer.apk is listed DELETE IT!
via http://www.droiddog.com/android-blog/2010/08/psa-sms-trojan-for-android-on-the-loose/
how would you even get this?
markus_del_marko said:
how would you even get this?
Click to expand...
Click to collapse
REALLY? You would obviously get this from androidviruses.com...lol.
No idea though...
steindog99 said:
REALLY? You would obviously get this from androidviruses.com...lol.
No idea though...
Click to expand...
Click to collapse
i didn't know we had to worry about viruses on android.
markus_del_marko said:
i didn't know we had to worry about viruses on android.
Click to expand...
Click to collapse
Android is a version of Linux. That means that.. anything can be made for it! It's open and everyone has the source. Some people decide not to use that for good.
HeroMeng said:
Android is a version of Linux. That means that.. anything can be made for it! It's open and everyone has the source. Some people decide not to use that for good.
Click to expand...
Click to collapse
to my knowledge there are no linux viruses in the wild. windows has the most attacks.
markus_del_marko said:
to my knowledge there are no linux viruses in the wild. windows has the most attacks.
Click to expand...
Click to collapse
The reason there aren't any Linux viruses is because the average consumer uses Windows (not Linux or Mac).
HeroMeng said:
The reason there aren't any Linux viruses is because the average consumer uses Windows (not Linux or Mac).
Click to expand...
Click to collapse
this i know!
The thing is... this would tell you it has permission to send SMS when you install it, right?
porn is bad people!
You'd have to install it.
markus_del_marko said:
to my knowledge there are no linux viruses in the wild. windows has the most attacks.
Click to expand...
Click to collapse
Wow, rose colored glasses there. But then as you said, "to my knowledge".
While the number of viruses known for Windows is much higher, Linux certainly has its fair share of issues with viruses, malware and rootkits.
http://en.wikipedia.org/wiki/Linux_malware
Linux viruses don't appear in view very often because yes, the user base is still very small, sadly, compared to Windows, so virus writers don't target those systems as much. But it's still very possible to unknowingly install a virus on a Linux machine.
If you're very careful about what you're doing and what you allow to have root access though, you are relatively safe.
And this includes Android apps.
While I like the fact that the Android Market is wide open, it caused a total glut of "useless" apps that much of the younger crowd just eats up.
Wallpaper apps, ringer background apps, slideshow apps. There are thousands of these "apps" in the Market now and those who aren't quite as vigilant at watching to make sure what they're installing are just ripe to receive malware.
LInux viruses..
Linux does have viruses..just not abundant...plus..windows virus can be written in 5 min with some geek looking at youtube...linux..could take weeks ,months to get a functional virus/ exploit...cheers!
Alright, now how many people in this thread actually beleive that a virus is going to have "trojan" right in the name.
Come on now, don't be shy.
abcdfv said:
Alright, now how many people in this thread actually beleive that a virus is going to have "trojan" right in the name.
Come on now, don't be shy.
Click to expand...
Click to collapse
We're a good community, when we make a virus, we make sure to let everyone know what it is
wow... Figured this would happen sooner or later.
Why does it have trojan in the name? Same reason why most viruses have their name set somewhere within their carrier or payload file. Cause most virus makers want attention.
Why do virus makers want attention? Think about it. It could be some little bastard who works for a legit studio that's getting paid on the side by Microsoft or Apple, or even Blackberry to smug down the growing Android popularity because you see my friends, if you think about it, very VERY little Google has ever set out to do was not successful. They have dominated in very many things, and this pisses people off that have share in those companies that Google has direct competition with so therefore, any negative press for google is great press for them. Think about it.
(what I will probably see on cnet.com, cbs.com, nightline, etc.etc. every other crazy i-butt superfan site)
Google's Android is deemed unsafe!
Android's first virus is massive and widespread!
(insert mindless scare propaganda here)
(and here)
(and here)
People in white robes and turtlenecks will be clutching their i-poops in shock and horror as their Android laden friends get massive phone bills cause their kid hits install on 100x apps that state !will take your money! (but will have cute kittens, some crappy rap ringtones, and photos of chicks in bikini's that were ripped from some russian child porn site in the information/security section of the market :X
nice scare tactics i really hate when people Half ass the information. While this is true the OP failed to clarify the facts. So i'll do it for the OP
antivirus firm Kaspersky Lab discovered a Trojan Horse (a form of malware) that is attacking phones running the Google Android software in Russia. The malware appears to be a harmless media player. But once it is installed, the Trojan Horse sends text messages to premium-rate phone numbers without the user’s consent. That results in text message expenditures that users don’t discover until they get their monthly cell phone bills.
with farther research i have discovered this app is ONLY in Russia and isn't on any version of the market. So basically you have install it from an unknown source.
just google Kaspersky discovers Android trojan and you can read all about it
abcdfv said:
Alright, now how many people in this thread actually beleive that a virus is going to have "trojan" right in the name.
Come on now, don't be shy.
Click to expand...
Click to collapse
That's the APK name, not the app name. When you're installing an app from the market, does it show you the name of the actual apk? If you look in your data/apps folder, the names of apps aren't the same as the names of the apks.

Mallware APPS Found on Market.

Found this today, just thought I would share. Some of us might have an app or two on this list.
http://www.readwriteweb.com/archive...tm_campaign=Feed:+readwriteweb+(ReadWriteWeb)
Interesting read. Thank you.
Sent from my SGH-T959 using XDA Premium App
Isn't Android Linux? So why is it getting malwares?! lol.
Also, I can't believe the fact that I have to install an antivirus App on my phone is closer to becoming the reality.
PaiPiePia said:
Isn't Android Linux? So why is it getting malwares?! lol.
Also, I can't believe the fact that I have to install an antivirus App on my phone is closer to becoming the reality.
Click to expand...
Click to collapse
any OS can be a target for viruses or malware. With Android becoming rather popular it's now becoming a target. People making viruses and malware programs want to hit a larger target not a smaller target.
Thanks for sharing the info.
Sent from my Loki powered Vibrant via the XDA App
Mallware? You mean apps that do autonomous shopping? That's what your significant other is for. Can't replace 'em with an app!
Scoobyracing03 said:
PaiPiePia said:
Isn't Android Linux? So why is it getting malwares?! lol.
Also, I can't believe the fact that I have to install an antivirus App on my phone is closer to becoming the reality.
Click to expand...
Click to collapse
any OS can be a target for viruses or malware. With Android becoming rather popular it's now becoming a target. People making viruses and malware programs want to hit a larger target not a smaller target.
Click to expand...
Click to collapse
I read about this on engadget & androidcentral had provided a list on which apps it was. AFAIK, I would've never downloaded those apps but one can never be too careful when it comes to personal information. I just installed Lookout a few mins ago.
I hate bastards that make virus's and stuff just to be funny. I would like to shove their phone up their butt. nah they might like it
Luckily, my edition of Common Sense 2011 works for Android too!
Xan_Kriegor said:
Luckily, my edition of Common Sense 2011 works for Android too!
Click to expand...
Click to collapse
If only that were shareware, then everyone could have some.
Sent from my Loki powered Vibrant via the XDA App
PaiPiePia said:
Isn't Android Linux? So why is it getting malwares?! lol.
Also, I can't believe the fact that I have to install an antivirus App on my phone is closer to becoming the reality.
Click to expand...
Click to collapse
android is unix based, but the thing is, the apps can run in the background.
The affected apps use the rageagainstthecage exploit to gain root, then run scripts in the background to get specific information (at least that's what they've identified so far). The thing is, anything (from what i originally heard) below 2.2.1 was able to have an app run the rageagainstthecage exploit or exploid exploit ran without any user interference, but apparently it is not pre-gingerbread.
Xan_Kriegor said:
Luckily, my edition of Common Sense 2011 works for Android too!
Click to expand...
Click to collapse
We need to copies of the 2011 edition out to everyone now!!!!!
Where's that rapper fellow when you need him?!
I help you guys out there ,everythime u download app from market look under what it controls ect u download task killer and in description says it controls network data ,i dont think so budddy ,do the math ppl
Besides that, carefully checking permissions, keep an eye out for those apps very easily by not allowing apps to get root. I actually downloaded an app a couple of weeks ago that asked for root.... Don't think so buddy. Uninstalled immediately, went to the market, rated it one star and made a comment about it! Thankfully we have a very well made super user app that asks whether you want to grant root privileges every time.
Quite frankly you have to be asking for it, giving root to any app.
bartek25 said:
I help you guys out there ,everythime u download app from market look under what it controls ect u download task killer and in description says it controls network data ,i dont think so budddy ,do the math ppl
Click to expand...
Click to collapse
Bartek! The voice of reason.
Sent from my Loki powered Vibrant via the XDA App
lol i reached my thanks limit for today but tomo you get two Br1cK'd

[Q] SU password on Atrix - to change or not to change...

I know when I jailbroke the iPhone you had to set a password via SSH so random people couldn't hack into your phone and hijack it.
Does the same vulnerability exist on a rooted Atrix? I know you get the notification that SU is being requested and you can deny it, but is there an IP back door as well that is "silent"?
Generally speaking, should people change/set and SU password? I've read some horror stories about it so far, so I'm not sure that's the right way to go.
Thanks
Afaik there is no way to set a su password. lookout security will scan all apps on your phone and when you downlad to prevent malicious software. There are several others but Lookout is my fav.
the reason the iphone requires this is that it is running SSHD always. the atrix doesnt run sshd unless you install an app to do so.
I was under the impression that "lookout " and the like are at best useless, and at worst, malware in and of themselves... no?
Sent from my MB860 using XDA App
I thought so too at one point
dmdmd said:
I was under the impression that "lookout " and the like are at best useless, and at worst, malware in and of themselves... no?
Sent from my MB860 using XDA App
Click to expand...
Click to collapse
but lookout has gotten good marks from every point of review I've seen thus far, including friends and colleagues who've used it personally. While there is little in the way of malware for lookout to catch, it has been updated quickly to catch all the known malware out there.
I also had the same concern with su as a previously jailbroken IP4 owner. The difference here is the java layer. All java apps that try to gain root will have to go through the 'superuse' app that accompanies the installation of 'su'. 'superuser' will ask you to approve the privilege escalation of each app that requests it. I don't know enough about android to know if native apps will come with this same restriction or not. If you shell into your phone, however, nothing stops you from running 'su' yourself.
Pirateghost said:
the reason the iphone requires this is that it is running SSHD always. the atrix doesnt run sshd unless you install an app to do so.
Click to expand...
Click to collapse
Exactly this here. An Android phone doesn't have this daemon (aka thing that runs in the background) like jailbroken iPhones do, so there is nothing to password protect. Just gotta make sire someone doesn't plug your phone into their computer if you have usb debugging enabled... lol.
Sent from my MB860 using XDA App
no such requirement
because there is no server app for SSH thus no way to access to your phone via LAN
Sent from my MB860 using XDA App

Google blocking rooted phones to access movie app.

Hope this hasn't been posted before but apparently google is blocking rooted phones from accessing the new movies app.
www.androidcentral.com/google-movies-blocked-rooted-devices?utm_source=ac&utm_medium=twitter
probably wouldn't have used this service anyway
but what a BS move by Google
I hope that this isn't starting point for blocking another services on rooted phones (like whole market)..
Seems like some bad logic... They don't want you renting a movie if your phone is rooted, since you might pirate it. However, you would think if one is technical enough to root their phone (or even know that it is an option), they probably know enough to pirate a movie without paying for it in the first place...
Something tells me this isn't Google's idea. I think they've had their arms twisted.
Wonder how an internet connection can tell phone is rooted .
jje
Ayrlupine said:
Something tells me this isn't Google's idea. I think they've had their arms twisted.
Click to expand...
Click to collapse
What he said. Movie studios and record companies are a money grabbing greedy lot who will do anything to continue filling their pockets.
I highly doubt this is Google. It goes against their ENTIRE WAY of thinking/operating.
Google don't encourage rooting, but they certainly don't condemn it - because that's one of the joys of open source development.
Google "making" this decision is like Apple, forgetting to patent one of it's products/possible products...and we all know that will never happen!
As (below/above/previous post said) it has to be legalities with the studio companies.
I don't think it's possible to detect you're rooted. If you have root, you have full control over your OS, so you can make some app think it's installed on non-rooted device. No problem, really.
Brut.all said:
I don't think it's possible to detect you're rooted. If you have root, you have full control over your OS, so you can make some app think it's installed on non-rooted device. No problem, really.
Click to expand...
Click to collapse
It's pretty easy to detect root actually
Sent from my MB860 using XDA Premium App
LancerV said:
It's pretty easy to detect root actually
Sent from my MB860 using XDA Premium App
Click to expand...
Click to collapse
mehh, someone will find a loop-hole!
LancerV said:
It's pretty easy to detect root actually
Click to expand...
Click to collapse
It's easy to detect root if OS will let you detect it ;-) E.g. you could look for "su" command or Superuser.apk, but it should be possible to hide them for specific app. Also it should be possible to crack an app, so it won't look for root at all.
Brut.all said:
It's easy to detect root if OS will let you detect it ;-) E.g. you could look for "su" command or Superuser.apk, but it should be possible to hide them for specific app. Also it should be possible to crack an app, so it won't look for root at all.
Click to expand...
Click to collapse
Yeah. I'm also sure you could move su to another name, and refactor Superuser.apk to use another app name. Then you could create a symlink for su to the new binary, and use a service or daemon to remove it when a particular event occurs.
Or, they could simply be checking ro.secure, which is set in the initramfs...

Categories

Resources