[Q] Looking for com.sony.device shared library - Xperia Z2 Q&A, Help & Troubleshooting

Hello, everyone.
I'm trying to install LifeLog.apk on my Nexus 5, but getiing:
Code:
Package com.sonymobile.lifelog requires unavailable shared library com.sony.device; failing!
Is anyone can provide com.sony.device shared library by any chance?
Thanks.

xprntl said:
Hello, everyone.
I'm trying to install LifeLog.apk on my Nexus 5, but getiing:
Code:
Package com.sonymobile.lifelog requires unavailable shared library com.sony.device; failing!
Is anyone can provide com.sony.device shared library by any chance?
Thanks.
Click to expand...
Click to collapse
Workin' on porting Sony libraries to n5 too, and ported com.sony.device.jar from xperia z3 to n5, and it doesnt change this error

Related

dot42 open source Xamarin alternative

dot42 is open source Xamarin alternative. You can create Android app using c#. You can grab latest stable version from official repository https://github.com/dot42/dot42. But developer Olaf Pettersen created many fixes and improvements on it own repository https://github.com/ninjasync/dot42. So I forked it, made some fixes, compiled and generated setup from Olaf repository. You can download it from my gdrive https://goo.gl/jxAHgF
Olaf ported some libraries to work with dot42: MVVM Cross, JSON .NET, OxyPlot etc. Check his repository.
If you have any question about how to compile your own version you can ask here.
Currently android 5.0 is not supported. Apk files not working.
Hi, I have already a game build in C so I can covert it in an apk file with this software? Is it possible? E.g. In one of game's folder there are file like
File ACT
File AIR
File CNS, DEF e SFF
Sent from my LG-D802 using Tapatalk 4 Beta

[MOD][XPOSED][APP] SSLUnpinning - Certificate Pinning Bypass

SSLUnpinning - Certificate Pinning Bypass
If you need intercept the traffic from one app who use certificate pinning, with a tool like Burp Suite Proxy, the SSLUnpinning help you with this hard work!
The SSLUnpinning through Xposed Framework, make severous hooks in SSL classes to bypass the certificate verifications for one specific app, then you can intercept all your traffic.
Source Code in GitHub
/ac-pm/SSLUnpinning_Xposed
Cool module. Big thanks!
I'm getting an error in the Xposed log:
Loading Xposed v54 (for Zygote)...
Running ROM 'KTU84P' with fingerprint 'google/nakasi/grouper:4.4.4/KTU84P/1227136:user/release-keys'
Loading modules from /data/app/mobi.acpm.sslunpinning-1.apk
Loading class mobi.acpm.sslunpinning.Module
java.lang.IllegalAccessError: Class ref in pre-verified class resolved to unexpected implementation
at dalvik.system.DexFile.defineClassNative(Native Method)
at dalvik.system.DexFile.defineClass(DexFile.java:222)
at dalvik.system.DexFile.loadClassBinaryName(DexFile.java:215)
at dalvik.system.DexPathList.findClass(DexPathList.java:322)
at dalvik.system.BaseDexClassLoader.findClass(BaseDexClassLoader.java:54)
at java.lang.ClassLoader.loadClass(ClassLoader.java:497)
at java.lang.ClassLoader.loadClass(ClassLoader.java:457)
at de.robv.android.xposed.XposedBridge.loadModule(XposedBridge.java:421)
at de.robv.android.xposed.XposedBridge.loadModules(XposedBridge.java:386)
at de.robv.android.xposed.XposedBridge.main(XposedBridge.java:120)
at dalvik.system.NativeStart.main(Native Method)
Any idea what the issue might be? I'm running 4.4.4 on a Nexus 7 nakasi-grouper
pwntastic said:
I'm getting an error in the Xposed log:
Loading Xposed v54 (for Zygote)...
Running ROM 'KTU84P' with fingerprint 'google/nakasi/grouper:4.4.4/KTU84P/1227136:user/release-keys'
Loading modules from /data/app/mobi.acpm.sslunpinning-1.apk
Loading class mobi.acpm.sslunpinning.Module
java.lang.IllegalAccessError: Class ref in pre-verified class resolved to unexpected implementation
at dalvik.system.DexFile.defineClassNative(Native Method)
at dalvik.system.DexFile.defineClass(DexFile.java:222)
at dalvik.system.DexFile.loadClassBinaryName(DexFile.java:215)
at dalvik.system.DexPathList.findClass(DexPathList.java:322)
at dalvik.system.BaseDexClassLoader.findClass(BaseDexClassLoader.java:54)
at java.lang.ClassLoader.loadClass(ClassLoader.java:497)
at java.lang.ClassLoader.loadClass(ClassLoader.java:457)
at de.robv.android.xposed.XposedBridge.loadModule(XposedBridge.java:421)
at de.robv.android.xposed.XposedBridge.loadModules(XposedBridge.java:386)
at de.robv.android.xposed.XposedBridge.main(XposedBridge.java:120)
at dalvik.system.NativeStart.main(Native Method)
Any idea what the issue might be? I'm running 4.4.4 on a Nexus 7 nakasi-grouper
Click to expand...
Click to collapse
sorry, I can't reproduce this error.
i tried it , it does not hook any app :/ i launched it from Exposed , even twitter app does not hook and throw me errir of network .. after CONNECT tunel , i will get network error .. means pinning ..
k3rnel31 said:
i tried it , it does not hook any app :/ i launched it from Exposed , even twitter app does not hook and throw me errir of network .. after CONNECT tunel , i will get network error .. means pinning ..
Click to expand...
Click to collapse
At this time only JSSE and Apache libraries are hooked. It is possible that your applications are using other libraries. For example Volley or LoopJ.
acarlosmartins said:
At this time only JSSE and Apache libraries are hooked. It is possible that your applications are using other libraries. For example Volley or LoopJ.
Click to expand...
Click to collapse
hi thanks for reply well some friend of friend lol has developped trustkiller from github and he is able to hook all apps so far :/ well how can i know wich libraries are used by some app ?
i decompiled it and changed both of checkClientTrusted,checkserverTrusted by putting return-void on first line but still now working
.method public checkClientTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/StringV
return-void
k3rnel31 said:
hi thanks for reply well some friend of friend lol has developped trustkiller from github and he is able to hook all apps so far :/ well how can i know wich libraries are used by some app ?
i decompiled it and changed both of checkClientTrusted,checkserverTrusted by putting return-void on first line but still now working
.method public checkClientTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/StringV
return-void
Click to expand...
Click to collapse
If you look at the two projects (trustkiller and SSLUnpinning), you will see that both hooks the same methods.
To find what the library used, you can do a reverse engineering in the apk. The dex2jar to convert apk to jar and with JD-GUI you can see the java code.
Good job with the return-void! :good:
acarlosmartins said:
If you look at the two projects (trustkiller and SSLUnpinning), you will see that both hooks the same methods.
To find what the library used, you can do a reverse engineering in the apk. The dex2jar to convert apk to jar and with JD-GUI you can see the java code.
Good job with the return-void! :good:
Click to expand...
Click to collapse
heyy thanks , yeah i know about jar to see the java code , but u can success recompiling and running the app only with smaliing , yeah anyway nowdays apps are using Obfuscator method wich makes decompiling the app very hard to understand it , and me myself i hooked ssl pinning for (subcard,anando uk,subway usa apk apps) and i found that + of the ssl pinning they are doing more private parameters with the post data like signature,token, .. and those params are generated instantly according with time/user/pass , anyway i decrypted all their paramraters : D , but sill my friend does not wanna share the developped trustkiller module with cydia ..
k3rnel31 said:
heyy thanks , yeah i know about jar to see the java code , but u can success recompiling and running the app only with smaliing , yeah anyway nowdays apps are using Obfuscator method wich makes decompiling the app very hard to understand it , and me myself i hooked ssl pinning for (subcard,anando uk,subway usa apk apps) and i found that + of the ssl pinning they are doing more private parameters with the post data like signature,token, .. and those params are generated instantly according with time/user/pass , anyway i decrypted all their paramraters : D , but sill my friend does not wanna share the developped trustkiller module with cydia ..
Click to expand...
Click to collapse
I thought you were talking about this module https://github.com/iSECPartners/Android-SSL-TrustKiller
acarlosmartins said:
I thought you were talking about this module https://github.com/iSECPartners/Android-SSL-TrustKiller
Click to expand...
Click to collapse
yeah thats right this module of cydia some friend has developped it , so now it catch most 99% of the latest app including old apps . i added u on skype ,
k3rnel31 said:
yeah thats right this module of cydia some friend has developped it , so now it catch most 99% of the latest app including old apps . i added u on skype ,
Click to expand...
Click to collapse
My skype id is antoniocarlosp.m
Nice module. Thanks.
I just tried it on an app that doesn't have permissions for external storage, and the module threw an exception because it couldn't read the app.conf file. I worked around this by patching the APK on the app I was looking at to include WRITE_EXTERNAL_STORAGE, but would it be possible to provide a fix for this in the module, for times when patching the target APK isn't feasible?
Thanks again!
Scytmo said:
Nice module. Thanks.
I just tried it on an app that doesn't have permissions for external storage, and the module threw an exception because it couldn't read the app.conf file. I worked around this by patching the APK on the app I was looking at to include WRITE_EXTERNAL_STORAGE, but would it be possible to provide a fix for this in the module, for times when patching the target APK isn't feasible?
Thanks again!
Click to expand...
Click to collapse
Thanks! I will open an issue for this.
Try the Inspeckage github.com/ac-pm/Inspeckage . It has this feature and many others.
acarlosmartins said:
SSLUnpinning - Certificate Pinning Bypass
If you need intercept the traffic from one app who use certificate pinning, with a tool like Burp Suite Proxy, the SSLUnpinning help you with this hard work!
The SSLUnpinning through Xposed Framework, make severous hooks in SSL classes to bypass the certificate verifications for one specific app, then you can intercept all your traffic.
Source Code in GitHub
/ac-pm/SSLUnpinning_Xposed
Click to expand...
Click to collapse
It doesn't seem to work at all in Android 7.1 (nougat), nor does JustTrustMe.
Does anyone have an alternative?

[AOSP] Android Framework replace in stock roms

Hi, im currently developing a system for wifi-direct application testing.
To do so, i need to change some classes in the android framework, specially in android.net.wifi package.
I've downloaded the Android 6.0.0 source tree, made some changes and recompiled it to x86 to push the new framework into the emulator. (Running Nexus 6 image with Android 6.0.0)
After that i pushed the recompiled jars, boot.art and boot.oat, and the odex files.
When i restart the emulator the image don't work.
Is this possible to do? Change the framework or at least part of her implementation and manually push the files into the emulation?
If so, what can i be doing wrong?
Thanks for the help, Filipe Teixeira

Android AOSP NDK compilation problem

Hi,
I'm working on a native application that display the chipsetID.
When i test with a simple application HelloWorld and compile using ndk-build, it work and i found the apk under system/bin. But when i include nexus header,it generate errors "File not found" .
Best Regards.

Linking & Using Non-NDK Android Platform Libraries

Hey Guys,
I'm working on a global audio tuning system for Android similar to Viper4Android and JamesDSP, but allowing the User to program and create their own audio filters on the fly. In order to do so I need to link against libLLVM.so which is one of the Android Platform Libraries which doesn't seem to be exposed via the NDK (https://android.googlesource.com/platform/external/llvm/).
My assumption is that I will need to build that library from AOSP Source independent of my project and then link against my locally built copy. Once compilation of my project is complete I don't need to distribute my locally built libLLVM.so file since I can leverage the one existing on the actual device.
I just wanted to see if anyone has any experience doing this, or if I'm going off the deep end.
Thanks!

Categories

Resources