(I here is "android-15\armeabi-v7a") in the "system.img" open. Extract the "Build.prop" file from its root directory to the hard disk, open it with a text editing tool (such as Notepad), and delete its "Ro.config.nocheckin=yes" line. Of course, the outfit plus the "#" comment off can also seem superfluous. Then import the changed "Build.prop" back to the original location in the image to replace the original file. Remember to set the file permissions to "0644". It must be remembered that this c
and look for it. I will not explain it.
ØADB push c: \ wherever_you_put \ tcpdump/data/local/tcpdump
Modify file attributes
ADB Shell
Su
Chmod 6755/data/local/tcpdump
Command Line packet capture
/Data/local/tcpdump-p-VV-S 0-W/Sdcard/capture. pcap-Which path do you write by the way?
(If tcpdump: no suitable device found appears. Make sure that you are using the root permission)
^ C after the packet capture is complete and exit Android bash
ADB pull/
file can be read executable, other people can read executable;Here an extra set of suid and GUIDs, so the entire permission bit into 6755, the previous 6 let ordinary users perform su when the feeling is root in the same way;chmod 6755 /system/xbin/suDetailed can refer to: http://blog.chinaunix.net/uid-26642180-id-3378119.htmlYou can also search: suid GUID keywordTwo Action article 2.1 viewing the partitio
and write executable and owner can read and write executable, everyone in the group that owns the file can read and execute, and others can read and execute;
The suid and guid are set here, so the entire permission bit is changed to 6755. The first six let the common user feel that the root user is executing the su;
chmod 6755 /system/xbin/su
Detailed can refer to: http://blog.chinaunix.net/uid-26642180-id
Android1) First go to Google to get Procrank, Procmem, libpagemap.so three files2) Then push file, execute ADB push procrank/system/xbin adb push PROCMEM/system/xbin ADB push Libpagemap.so/system/lib3) empowering adb shell chmod 6755/system/xbin/procrank adb shell chmod 6755/system/xbin/procmem adb shell chmod 6755/system/lib /libpagemap.so,4) in the Open tool r
phone. Normally there is no root phone we can get PSS. PSS is obtained by the following command:adb shell dumpsys meminfo 4. Procrank provided via Android1) First go to Google to get Procrank, Procmem, libpagemap.so three files2) Then push file, execute ADB push procrank/system/xbin adb push PROCMEM/system/xbin ADB push Libpagemap.so/system/lib3) empowering adb shell chmod 6755/system/xbin/procrank adb shell chmod
$
Accidentally implemented the ADB shell chmod 6755/system/app/How to recover in Android.chmod 755/system/appThe difference between the Android apk root and usb adb permissionsUSB ADB Authority is when the ADB is connected to a cell phone, the daemon on the phone adbd as root, so its subprocess has root privileges, usually if the ADB shell sees:Android version after 4.0:C:\USERS\MTK29\DESKTOPGT;ADB Shellroot@android:/#Android Version 2.3:C:\USERS\MTK
Shellcode as follows:' A ' * + ' \x73\xbf\x03\x40 ' + ' \x7f\xfa\x05\x40 ' + ' \x71\xbf\x03\x40 ' + ' a ' * 4 + ' \xe9\xf7\x03\x40 'DEMO3, execute arbitrary scriptDEMO2 can only perform "/system/bin/sh", but often this cannot be exploited because we are unable to communicate with the target process, and we often prefer to have the root target process run directly to the power script. So in this demo, we implement arbitrary scripts.We use "chmod 6755
1. The phone must have root privileges2. Download Tcpdump http://www.strazzere.com/android/tcpdump3.tcpdumptcpdump 4. adb shell chmod 6755/data/local/tcpdump 5, adb shell, su get root permission6, Cd/data/local7,./tcpdump-i Any-p-S 0-w/sdcard/capture.pcapCommand parameters:# '-I any ': Listen on any network interface# "-P": Disable promiscuous mode (doesn ' t work anyway)# "-S 0": Capture the entire packet# "-W": Write packets to a file (rather than p
does not have execute permissions, This permission should be the S-setuid bit in the uppercase s and lowercase s, and this principle is also shown in the following example;[Email protected] home]# chmod 2740 slackdir/[Email protected] home]# ls-ld slackdir/drwxr-S---2 root root 4096 04-24 18:25 slackdir/This example is because the group that the directory Slackdir belongs to does not have execute permission, it is originally displayed on the execution permission bit--because of the setuid, it i
1. The mobile phone must have the root permission
2. Download tcpdumpHttp://www.strazzere.com/android/tcpdump
3.Adb push c: \ wherever_you_put \Tcpdump/Data/local/Tcpdump
4.Adb shell chmod 6755/data/local/Tcpdump
5, adb shell,Su obtains the root permission.
6. cd/data/local
7,./tcpdump-I any-p-s 0-w/sdcard/capture. pcap
Command parameters:
# "-I any": listen on any network interface
# "-P": disable promiscuous mode (doesn' t work anyway)
# "-S 0": ca
InstructionsHttp://source.android.com/porting/tcpdump.htmlSource code and documents entsHttp://www.tcpdump.org/Compiled Binary DownloadHttp://www.strazzere.com/android/tcpdumpWiresharkHttp://www.wireshark.org/download.htmlInstalling tcpdumpPushing the binary to an existing deviceDownload tcpdump fromHttp://www.tcpdump.org/, then execute:CMD codeADB RootADB remountADB push/wherever/you/Put/tcpdump/system/xbin/tcpdumpADB shell chmod 6755/data/local/tmp/
的访问路径If in the public network environment, it is recommended to make the next limit on the firewall, only allow 8081 to come in, 1101 for intranet access, so relatively safe, and do not have to enter the cumbersome password.Under Http://localhost:1101/admin/metrics, you can see output similar to the following:{mem:466881,mem.free:289887,processors:4,instance.uptime:10947,uptime:18135,systemload.average:3.12646484375, heap.committed:411648,heap.init:131072,heap.used:121760,heap:1864192,nonheap.co
example below;
[Root@localhost home]# chmod 2740 slackdir/[Root@localhost home]# ls-ld slackdir/Drwxr-s---2 root root 4096 04-24 18:25 slackdir/
This example is because the group that the directory Slackdir belongs to does not have execute permissions, and it was originally displayed on the execution permission bit--because of the setuid, it is displayed as S.
How do we run a command if we have a primary readable writable executable for a file, a group that belongs to a readable executable
ADB: adb devices: Use the next sentence to query 5037 port occupancy when failed Netstat-ano | findstr 5037: then view the occupied PID and close the occupancy program. tcpdump Grab Bag : 1. Download Tcpdump http://download.csdn.net/detail/happylisher/8035645 3. adb push c:\wherever_you_put\tcpdump /data/local/tcpdump 4. adb shell chmod 6755/data/local/tcpdump 5, adb shell, su get root permission 6, Cd/data/local 7,./tcpdump-i Any-p-S 0-w/sdcard/capt
1. The mobile phone must have the root permission2. Download tcpdump http://www.strazzere.com/android/tcpdump3. ADB push c: \ wherever_you_put \ tcpdump/data/local/tcpdump4. ADB shell chmod 6755/data/local/tcpdump5. ADB shell and Su get the root permission6. CD/data/local7,./tcpdump-I any-p-S 0-W/sdcard/capture. pcapCommand parameters:# "-I any": Listen on any network interface# "-P": Disable promiscuous mode (doesn' t work anyway)# "-S 0": capture th
Android uses tcpdump to capture packets
Http://mysuperbaby.iteye.com/blog/902201
Blog type:
Android
Androidaccessgohtml
Instructions
Http://source.android.com/porting/tcpdump.html
Source code and documents ents
Http://www.tcpdump.org/
Compiled Binary Download
Http://www.strazzere.com/android/tcpdump
Wireshark
Http://www.wireshark.org/download.html
Installing tcpdumpPushing the binary to an existing deviceDownload tcpdump from http://www.tcpdump.org/, then execute: cmd code
ADB Root
A
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.