User Tools

Site Tools


project:android:start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
project:android:start [2016/11/25 05:40] – [Research Wishlist] ruzaproject:android:start [2018/07/25 17:29] (current) – [Android Security] ruza
Line 1: Line 1:
 ====== Android ====== ====== Android ======
-{{template>infobox|+{{template>:project:infobox|
 name=Android| name=Android|
 image=androidpirate.png?200| image=androidpirate.png?200|
Line 6: Line 6:
 status=alive and kicking status=alive and kicking
 }} }}
 +
 +~~META:
 +status = active
 +&relation firstimage = :project:androidpirate.png
 +~~
  
 People involved in this project are interested in better understanding of android platform, learning ways how to improve android security or customize android platform for their specific needs. People involved in this project are interested in better understanding of android platform, learning ways how to improve android security or customize android platform for their specific needs.
Line 22: Line 27:
  
 ===== Knowledge base ===== ===== Knowledge base =====
-  * [[project:gsm]]+  * [[project:gsm:start]]
   * [[project:android:start#building_android_from_source | building from source]]   * [[project:android:start#building_android_from_source | building from source]]
   * [[project:android:start#android_security | security]]   * [[project:android:start#android_security | security]]
Line 119: Line 124:
   * https://community.qualys.com/blogs/securitylabs/2012/07/25/android-security-evaluation-framework--a-s-e-f   * https://community.qualys.com/blogs/securitylabs/2012/07/25/android-security-evaluation-framework--a-s-e-f
   * https://github.com/thomascannon/android-sms-spoof   * https://github.com/thomascannon/android-sms-spoof
 +  * https://www.infsec.cs.uni-saarland.de/teaching/14WS/AndroidSecurityLab/files/03_AndroidSecurity.pdf
  
  
Line 141: Line 147:
 One solution to this problem is to compile your own root toolikt from open-source - f.e. [[https://github.com/android-rooting-tools/android_run_root_shell | Android run root shell]] (thx. 2 **[[user:da3m0n22]]** for link) One solution to this problem is to compile your own root toolikt from open-source - f.e. [[https://github.com/android-rooting-tools/android_run_root_shell | Android run root shell]] (thx. 2 **[[user:da3m0n22]]** for link)
  
 +==== Flashing recovery ====
 +No binaries you have to install. No shitty fastboot udev rules
 +
 +<code bash>
 +adb push recovery.img /storage/emulated/0/
 +adb shell
 +DEV=$(ls /dev/block/platform/*/by-name/recovery); echo $DEV
 +dd of=$DEV if=/storage/emulated/0/recovery.img
 +exit
 +adb reboot recovery
 +</code>
 ===== GPLv2 Android ===== ===== GPLv2 Android =====
  
Line 207: Line 224:
 == StrongSwan == == StrongSwan ==
 CA certificate needs to be imported to verify server side of communication. Certificate can be in tis binary form with .pem filename suffix CA certificate needs to be imported to verify server side of communication. Certificate can be in tis binary form with .pem filename suffix
 +
 +== logcat errors ==
 +to view system messages logged of the Error level only you can use an message filter like this:
 +<code>adb logcat '*:E'</code>
 ===== Android Open Accessory Development Kit ===== ===== Android Open Accessory Development Kit =====
  
project/android/start.1480052418.txt.gz · Last modified: 2016/11/25 05:40 by ruza