Private mode regardless of tripped knox? - T-Mobile Samsung Galaxy S 5

Hi,
So as far as I've read here, tripping the Knox will not allow you to use the "Private mode".
The Private mode is probably an app that move files in and out of a secured folder in the internal memory; if this is the case, maybe there is a way to find and tweak this private mode app so it won't be depending on the Knox flag?
If it's part of Knox itself, and assuming that the filesystem is being dumped, maybe a developer can yank this app out of Knox and enable it for those who root / modify the ROM?
Just a thought...

Related

[Q] How to check root status and warranty reclaim

I recently bought used (few weeks old) Samsung Galaxy S2 and i want to check is it rooted.
1. How can i do that?
I read that there are few ways, but how can i be sure that the phone is rooted?
-On the welcome screen there is exclamation mart in yellow triangle.
-I have the icon Superuser, but when I open it says "No apps in list". Under "log" there are few "Titanium Backup Allowed", one "Titanium Backup Denied" (somewhere in the middle), and one "Root Check Basic Allowed".
-I installed "Root Check Basic" from market and it says "This device has root acces!"
-When i start Titanium Backup I get picture similar to this http://galaxys2root.com/wp-content/uploads/2011/10/att-galaxys2-root-maclinux-7-690x416.jpg
But...
-I copied 01_Sherbet.ogg (sms sound) which is located in /system/media/audio/notifications to my computer, then i amplified the volume on this audio with SoundForge. This new audio with amplified volume (with the same name) i copied to my phone over bluetooth (in default location for bluetooth transfer files). Then i tried to copy/paste that file (in Astro) and overwrite over the old 01_Sherbet.ogg file. But i get this message:
Copy error
java.io.FileNotFoundException: /system/media/audio/notifications/01_Sherbet.ogg (Read-only file system)
If my phone is rooted, how can remove this "read only" setting for this file and overwrite it?
-Since i dont have wifi router (yet), i made ad-hoc network (for internet), but my S2 doesnt see it?! My Kaiser (wm6.5) and my laptop (windows 7) see it and can connect to internet just fine.
2. With rooting i lose warranty. But how can i gain warranty again (if one day i need it)? Is there any way to undo rooting, or should i flash it with stock rom, or...?
1). Your phone is rooted, you'll need to remount /system as R/W in whatever root file manager you're using.
2). Boot into download mode (vol down+home+power) and check counter. If it's >=1, your only option is a USB jig, and if that doesn't reset the counter (but does get you into download mode), you'll need to flash an older bootloader.
oinkylicious said:
1). Your phone is rooted, you'll need to remount /system as R/W in whatever root file manager you're using.
Click to expand...
Click to collapse
What exactly do you mean by "remount". I am using Astro, but i didnt find any option for that. If it is easier to do this in some other file manager tell me which, and i'll use it instead.
oinkylicious said:
2). Boot into download mode (vol down+home+power) and check counter. If it's >=1, your only option is a USB jig, and if that doesn't reset the counter (but does get you into download mode), you'll need to flash an older bootloader.
Click to expand...
Click to collapse
When im booting in download mode it askes me to press Volume Up if i want to install new firmware, or press Volume Down if i want to cancel. If i go to cancel, it just boots normaly. How can i exit the download mode safely without installing new firmware? And where can i see that check counter?
2. With rooting i lose warranty. But how can i gain warranty again (if one day i need it)? Is there any way to undo rooting, or should i flash it with stock rom, or...?
Flash stock rom reset custom rom counter with usb recovery jig .
When im booting in download mode it askes me to press Volume Up if i want to install new firmware, or press Volume Down if i want to cancel. If i go to cancel, it just boots normaly.
How can i exit the download mode safely without installing new firmware?
As above vol down or remove battery .
And where can i see that check counter?
As above continue to download mode vol up see counter remove battery .
jje
jje
1. I manage to remount RW some folders in Root Explorer (unlike Astro, this one has that option, and it is located in upper right corner of the screen). But it wont remount RW anything in /system (which is exactly what i need). Is there any other way to remount RW /system?
2. I check the counter and it says 1.
What does that mean?
And what should i do when/if i want to reclaim my warranty?
3. One more thing... In some aplications (like Astro) i have some commercials in lower part of the screen. Is this normal (for rooted phone), and how can this be removed?
badboys3 said:
1.
2. I check the counter and it says 1.
What does that mean?
One as single digit 1 means one invalid rom flashed .
And what should i do when/if i want to reclaim my warranty?
set it to zero with usb jig
3. One more thing... In some aplications (like Astro) i have some commercials in lower part of the screen. Is this normal (for rooted phone), and how can this be removed?
Advert supported apps normally show adverts as part of the T&C you signed up to for that app .
ROOT has nothing to do with adverts .
AdFree from the market may remove some of the adverts .
jje
Click to expand...
Click to collapse
Thank you JJEgan very much. I really approciate it.
When i want to regain warranty, i should set counter to 0 with usb jig.
-Is that all or should i flash some rom (stock)?
1. And if i should flash stock rom where can i find it?
2. Are those stock rom's country/region/network/etc specific or is it the same for all SGS2's?

[Q] Security practicality of SElinux for Android's' MAC?

Starting with Android 4.4 SELinux's MAC is enforced. Does this mean that if an app somehow can get installed and exploit the kernel to get root privileges, that MAC will still prevent that app with root privileges from accessing private app data?
Android Documentation says: "SELinux can be used to label these devices so the process assigned the root privilege can write to only those specified in the associated policy. In this way, the process cannot overwrite data and system settings outside of the specific raw block device." source - http://source.android.com/devices/tech/security/se-linux.html#use-cases
As a reference I am implementing a Mobile Device Management system and in the process I have to determine how secure Android OS is itself. That is why I need to know how secure corporate data stored on a device is to root-kits, spyware, and other malware.
p.s. This has been posted on the "Unix and Linux" StackExchange site with no one being able to answer yet. I'm hoping XDA's hands on experience with the Kernel will be able to help get this answered, Thank You .
milleraj66 said:
Starting with Android 4.4 SELinux's MAC is enforced. Does this mean that if an app somehow can get installed and exploit the kernel to get root privileges, that MAC will still prevent that app with root privileges from accessing private app data?
Click to expand...
Click to collapse
The answer is: "It depends."
Mandatory access controls systems like SELinux are very good at constraining application behavior to what is allowed by the security policy. In many cases, it can eliminate huge chunks of security vulnerabilities by sandboxing privileged applications so that exploitation of those applications is ineffective.
You may want to take a look at http://selinuxproject.org/~jmorris/lss2011_slides/caseforseandroid.pdf, specifically slides 7-9. This will give you an idea for what SELinux can and can't defend against.

knox 0*1 might be flag...but

ALL the SAMSUNG KNOX enabled users ,knox might be a flag ,
our OEM says that the flag cannot be changed once triggered,
what i think is it might be a flag or a ghost what ever it should be stored in the storage device or atleast updated on every boot.i your phone has knox untrigered as of now
ALL DEVELOPERS ARE REQUESTED TO READ THIS
.if it is what i think ,there are 90% chances to change it even after triggering,by making a backup of each and every stock partition,
the idea what i got is we need find a root method that doesn't trip knox ,after getting root first extract pit file from your device,store some where safely like ggoogle drive and analyse it using our xda online pit analyser and get addresses of each and every partition and backup them using dd command via adb or terminal emulator,once you have all partitions backed up[SYSTEM,DATA,CACHE can be ignored i think as we know what they store], store them on pc.
once your knox is triggered by a custom rom or recovery ,flash all the backked up partitions using rooted system via adb or terminal emulator using same dd commands used to backup ,after completion of all those flash stock firmware .i think now knox might be 0*0
ALL THE ABOVE IS ONLY MY IDEA ,NOT YET TESTED
ANY HELP IS ENCOURAGED ,AS KNOX IS A HEADACHE TO ALL THE USER WHO CONSIDER WARRANTY
CHANGING THE SECTION OF THREAD BY MODERATORS FOR MORE VISIBILITY TO ALL SAMSUNG DEVS IS ALSO REQUESTED

Backup of (Valve) Steam App's /data folder

Hi!
I need to fetch certain files from the Steam App's folder in the /data directory (to enable ASF to generate Steam Guard 2FA codes).
I'm not going to root my S9+ for it trips Knox, voids warranty and breaks certain functionality, but in the ASF documentation they mention some devices have an integrated functionality for making backups of apps:
The only currently supported non-root method is making a /data backup in one way or another and manually fetching appropriate files from it on your PC.
Click to expand...
Click to collapse
I highly doubt it is possible on the S9+, but I was redirected to here by the support staff of ASF, so I'm just going to ask.
Regards!

Is it possible to brute force an android phone's password without losing data and no root access or enabling USB debugging?

Hello, I have a SM-J200BT and I was wondering if I could brute force my way into the phone's password to gain access to the device without losing any data.
How should a Brute-Force-Attack help?
AFAIK the Google FRP pin / pattern / password is stored within a database located in Android's critical section. This db can only get accessed from outside if phone is rooted and ADB got enabled.
Ok so I guess reformatting the phone is the only option left, isn't it?
jwoegerbauer said:
How should a Brute-Force-Attack help?
AFAIK the Google FRP pin / pattern / password is stored within a database located in Android's critical section. This db can only get accessed from outside if phone is rooted and ADB got enabled.
Click to expand...
Click to collapse
s

Categories

Resources