OnePlus7T:/ $ pm grant com.kinandcarta.create.proxytoggle android.permission.WRITE_SECURE_SETTINGS
Exception occurred while executing 'grant': java.lang.SecurityException: grantRuntimePermission: Neither user 2000 nor current process has android.permission.GRANT_RUNTIME_PERMISSIONS. at android.app.ContextImpl.enforce(ContextImpl.java:2187) at android.app.ContextImpl.enforceCallingOrSelfPermission(ContextImpl.java:2215) at com.android.server.pm.permission.PermissionManagerService.grantRuntimePermissionInternal(PermissionManagerService.java:1477) at com.android.server.pm.permission.PermissionManagerService.grantRuntimePermission(PermissionManagerService.java:1459) at android.permission.PermissionManager.grantRuntimePermission(PermissionManager.java:378) at com.android.server.pm.PackageManagerShellCommand.runGrantRevokePermission(PackageManagerShellCommand.java:2419) at com.android.server.pm.PackageManagerShellCommand.onCommand(PackageManagerShellCommand.java:260) at com.android.modules.utils.BasicShellCommandHandler.exec(BasicShellCommandHandler.java:97) at android.os.ShellCommand.exec(ShellCommand.java:38) at com.android.server.pm.PackageManagerService.onShellCommand(PackageManagerService.java:25948) at android.os.Binder.shellCommand(Binder.java:970) at android.os.Binder.onTransact(Binder.java:854) at android.content.pm.IPackageManager$Stub.onTransact(IPackageManager.java:4818) at com.android.server.pm.PackageManagerService.onTransact(PackageManagerService.java:8987) at android.os.Binder.execTransactInternal(Binder.java:1226) at android.os.Binder.execTransact(Binder.java:1163)
近年来,Android手机平台上的恶意App呈不断上升的趋势,根据G DATA的数据仅2015年 第一季度发现了440267 种新的安卓恶意软件,也就是说,全球范围内每18秒就有一个新的恶意软件被发现。而天朝由于Google被封的原因,更是使恶意软件的传播更加猖獗。Google Play store 为了保证Android用户的安全做了大量的努力,和国内的一些第三方应用市场相比安全一些的。
> lsudo lsusb Bus 001 Device 002: ID 18d1:4ee7 Google Inc. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 002: ID 80ee:0021 VirtualBox USB Tablet Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
/* reject system packages */ if (userAppId < AID_APP) { panic("Package '%s' is not an application\n", pkgname); } /* reject any non-debuggable package */ if (!info.isDebuggable) { panic("Package '%s' is not debuggable\n", pkgname); }
> $NDK_PATH/toolchains/arm-linux-androideabi-4.9/prebuilt/linux-x86_64/bin/arm-linux-androideabi-gdb ~/Android/app_process GNU gdb (GDB) 7.6 Copyright (C) 2013 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "--host=x86_64-linux-gnu --target=arm-linux-android". For bug reporting instructions, please see: ... Reading symbols from /home/henices/Android/app_process...(no debugging symbols found)...done. (gdb) target remote :5039 Remote debugging using :5039 warning: Could not load shared library symbols for 100 libraries, e.g. /system/bin/linker. Use the "info sharedlibrary" command to see the complete listing. Do you need "set solib-search-path" or "set sysroot"? warning: Unable to find dynamic linker breakpoint function. GDB will be unable to debug shared library initializers and track explicitly loaded dynamic code. 0x4013a73c in ?? ()
(gdb) info proc process 16907 cmdline = 'com.heen.CVE_2014_7911' cwd = '/' exe = '/system/bin/app_process'
> dd if=/dev/block/mmcblk0p6 of=/sdcard/boot.img bs=4096 5632+0 records in 5632+0 records out 23068672 bytes transferred in 2.398 secs (9619963 bytes/sec)
>./adb pull /sdcard/boot.img /tmp/boot.img 4270 KB/s (23068672 bytes in 5.275s)
local uint page_size = header_section.header.page_size; local uint kernel_size = header_section.header.kernel_size; local uint ramdisk_size = header_section.header.ramdisk_size; local uint second_size = header_section.header.second_size;