Compare commits

...

8 Commits

4 changed files with 18 additions and 56 deletions

@ -1 +0,0 @@
Subproject commit 0350e46d6dbe398dc395675e348121fe3ae6624a

View File

@ -1,26 +1,30 @@
## Steps to root Android (Google Pixel4a-sunfish <Android 13>)
1. Enable dev options by tapping build number 7 times
2. Enable usb debugging and OEM unlocking in developer options panel from in Syste
3. Make note of build number at About phone -> Build number = TPIA.221105.002
4. Download full image for build from: https://developersd.google.com/android/ota#sunfish
5. Install fastboot: apt install fastboot and adb
6. Reboot to bootloader: adb reboot bootloader
7. Make sure fastboot is connected: fastboot devices
8. fastboot flashing unlock
4. Download full image for build from: https://developers.google.com/android/images
5. Unzip downoaded zip, then unzip the zip within there to get the "build.img" file needed
6. Push the build.img file to the unrooted Android device: `adb push <path_to_file>/boot.img /storage/emulated/0/Download/boot.img`
7. Install fastboot: `apt install fastboot and adb`
8. Reboot to bootloader: `adb reboot bootloader`
9. Make sure fastboot is connected: `fastboot devices`
10. `fastboot flashing unlock`
11. Sideload Magisk apk: `adb -s $(adb devices) install ~/Downloads/Magisk.apk/`, URL: https://github.com/topjohnwu/Magisk/releases/tag/v26.1
12. Patch the downloaded factory image file in Magisk: Magisk -> Install -> Select and patch a file -> Select the boot.img file pushed in step 6
13. Hit lets go to let Magisk patch image -> Wait for path of new image file on device to be printed if it worked
14. Pull patched image to desktop: `adb pull /storage/emulated/0/Download/magisk_patched-26100_zEIYy.img ./`
15. `adb devices` -> `adb reboot bootloader` -> `fastboot devices`
16. `fastboot boot ~/Desktop/magisk_patched-26100.img`
17. Root permanently via Direct Install from Magisk: Open Magisk app -> Install Direct (Recommended) -> wait and reboot
18. Verify root after reboot from desktop: `adb shell` -> `su` -> `whoami`
19. Install this ZIP as Magisk module to trust user certs and system certs: https://github.com/NVISOsecurity/MagiskTrustUserCerts/releases
9. Sideload Magisk apk: adb -s $(adb devices) install ~/Downloads/Magisk.apk/, URL: https://github.com/topjohnwu/Magisk/releases/tag/v26.1
10. Patch the downloaded factory image file in Magisk: Magisk -> Install -> Select and patch a file -> Select the unzipped boot.img file (Note: Within original zip for factory image there is another zip that boot.img is within)
11. Hit lets go to let Magisk patch image -> Wait for path of new image file on device to be printed if it worked
12. Pull patched image to desktop: Adb pull /storage/emulated/0/Download/magisk_patched-26100_zEIYy.img ./
13. Adb devices -> fastboot devices
14. Fastboot boot ~/Desktop/magisk_patched-26100.img
15. Root permanently via Direct Install from Magisk: Open Magisk app -> Install Direct (Recommended) -> wait and reboot
16. Verify root after reboot from desktop: “adb shell” -> “su” -> “whoami”
17. Install this ZIP as Magisk module to trust user certs and system certs: https://github.com/NVISOsecurity/MagiskTrustUserCerts/releases
*Note: Using Ubuntu 20 for desktop machine in instructions*

View File

@ -1,41 +0,0 @@
#!/bin/env python3
def check_bridge_socket()::
evt = None
return evt
def handle_bridge_evt(evt):
"""
TODO: Whatever bridge events to handle
"""
def check_debug_socket():
dbg_evt = None
return dbg_evt
def handle_debug_evt(dbg_evt):
""" TODO: Do something with the events here."""
def run_loop():
""" """
while True:
# 1. Check the BridgeSocket
evt = check_bridge_socket()
if evt != None:
handle_bridge_evt(evt)
dbg_evt = check_debug_socket()
if dbg_evt != None:
handle_debug_evt(dbg_evt)
def main():
"""
1. TODO: Open Server port that the device connects to.
2. TODO: Open Server port that an admin connects to, i.e., to test sending packets to
3. TODO (Optional): We might be able to start a Scapy [REPL](https://en.wikipedia.org/wiki/Read%E2%80%93eval%E2%80%93print_loop)
and then add these functions. That way the person in debugging the phone can do live testing.
"""
if __name__ == '__main__':
main()

BIN
setup_scripts/tcpdump Normal file

Binary file not shown.