Magisk Systemless Root Manager

Share if the site was helpful

In the wake of Chainfire selling SuperSU, Magisk has stepped in to fill the void. The best part about it is that this new root management solution is open source which SuperSU was lacking. The good part about this tool is that the root manager does still work with supersu, if you have already rooted with it. So if you just want to check out Magisk just go ahead and install it on your Supersu rooted device. Magisk is systemless root only which is nice for those of use that still want to use Android Pay or any other apps that check for root access on the device. Also because it doesn’t change anything on the system partition you can still take OTA updates without any problems. Just follow these directions below and you to can install it on your device as long as you have TWRP available for your device.

Installation Instructions
Before Magisk installs anything on your device, please note that magisk will create a boot image backup in /data/stock_boot_<sha1>.img.gz
If anything goes wrong (e.g. bootloop), you can either use the uninstaller (recommended) or decompress the backup and manually restore your boot image
It should ALWAYS bring your device back to life (supposing you have a custom recovery that can decrypt your /data)

If you’re already rooted with MagiskSU or Latest Official Systemless SuperSU

If you’re not rooted, or something went wrong and you need a clean start

  • (Recommended) Restore your boot image back to stock (flash uninstaller if Magisk is previously installed)
  • Download the latest Magisk zip file
  • Reboot to a custom recovery
  • If you choose to use SuperSU (only support Android 6.0+), flash SuperSU in systemless mode now
  • Flash Magisk zip
  • Reboot. Update the stub Magisk Manager to the latest from Play Store

Features

  • 100% fully open source and easy to build! 
  • Magic Mount:
    Allow you to do any system (vendor) modification without actually tampering the partitions.
  • MagiskSU: Open Source Root Solution
    Root your device with MagiskSU, based on phh’s Superuser, which is based on CM Superuser.
  • Magisk Manager:
    MagiskSU Root Management, Install / Upgrade Magisk in-app,
    Manage, Upgrade, Download, Install Magisk Modules within a few taps.
  • Magisk Hide:
    Hide Magisk from detection, including SafetyNet, which is used in Android Pay, Pokemon GO, Mario Run etc.
  • Resetprop:
    Allow you to do any modifications to system props (build.prop), including read-only props.
    It is also used for tricking the bootloader state, and (for Samsung) the KNOX state
  • Multiple Entry Points:
    Provide several entry points to developers, reliably pausing the boot process before everything is done.
    Include post-fs (cache) mode, which happens even earlier than data is mounted (used to replace Boot Animation etc.)
  • Standard Stuffs:
    Remove dm-verity, forceencrypt; includes a super complete busybox to guarantee consistent behaviour, and can also be toggled to be used universally.

Downloads

Latest Magisk
Latest Uninstaller (Support v1+)
Magisk Manager

If you have installed Magisk on your device please comment blow and let me know your thoughts.

Phonlab E-Campus Free Course

Share if the site was helpful

Phonlab E-Campus free Chromebook Support course

I have been working with Phonlab for many months now and we decided to bring everyone a FREE course on Chromebooks to help techs and repair shops trouble shoot and fix customer devices. If you want to get access to this FREE course just head over to Phonlab.Teachable.com and enroll. Once you enroll in the Chromebook Support course you will have access to all the lessons. We hope you enjoy them and if you find them handy you may want to check out Phonlab E-Campus where we cover smartphone repairs and security.

 

RootJunky

 

Lineage OS is taking CyanogenMod place

Share if the site was helpful

Lineage OS Android Distribution

As many of you know CyanogenMod has officially shut down as of December 25 2016. Lineage OS is looking to continue CM work under this new distribution. A company pulling their support out of an open source project does not mean it has to die. Lineage OS is just getting started and needs all the help it can get to really create some momentum. Lineage is looking for Build Slaves and Build Mirrors to help them out if you have something available to share please contact them HERE. They have already lunched there Gerrit, IRC, Github, and Reddit with a Wiki to follow soon. I am glad that someone has stepped in to fill the huge shoes of CyanogenMod in the Android community and I am really looking forward to see what Lineage has to offer and doing some reviews on it. I hope to see some new players with some amazing new customization in this new Android custom OS.  LINEAGE OS NEW DOWNLOAD PAGE CAN BE FOUND HERE

If you are wanting to stay up to date on any developments with Lineage OS, I would recommend following them on Twitter. I know I will be. What are your thoughts on this new Lineage OS?  Please comment below.

RootJunky Out.

R1 HD Amazon Bootloader unlock

Share if the site was helpful

R1 HD Amazon Bootloader unlock

BOOTLOADER UNLOCK METHOD 1

Hi Guys thanks to a team effort the Amazon R1 HD has root access with SP Flash Tool and TWRP recovery image.
I went ahead with the help of jcase and unlocked the bootloader because i wanted full access.

What i did is put together this script that will walk you through the steps to unlocking your Amazon R1 HD bootloader.
Steps are simple you just download this script that i created and click on the batch file once you have extracted it to your desktop. Follow the script it will walk you through everything.
Note Root access is required to use the script and you can watch a video on how to root the device below. My Script as been updated to work on Linux Mac or Windows

Download Files Here
BLU-R1-HD-Amazon-Bootloader-Unlock.zip

How to unlock the bootloader video

How to root and install twrp recovery video

Here are the steps to check if your bootloader is unlocked since people are asking. With the device turned on and adb debugging working. Run these commands in terminal or command window
adb reboot bootloader
Once in fastboot mode run this command to check if unlocked.
fastboot getvar all
It will return yes for unlock and no for locked.

BOOTLOADER UNLOCK METHOD 2

Steps
1. Download SP-Flash-Tool-bootloader-unlock.zip
2. Extract the SP-Flash-Tool-bootloader-unlock.zip to your desktop. Note 7zip is great to extract files.
3. lauch Flash_tool.exe
4. select scatter-loading and browser to load MT6735_Android_scatter_R1_Unlock.txt
5. click download button to start.
6. now plug your phone into the computer. to boot the device to preloader and start the flash. You can do it two ways: 1. power off the phone and flash will start or 2. From a powered off stat power on the device while plugged into the computer. either way will start the sp flash tool.
7. once the flash is complete which should take seconds you can unplug the device and reboot it. Congrats you can now unlock the bootloader like any normal device now.

WARNING UNLOCKING YOUR BOOTLOADER WILL WIPE DATA FACTORY RESET THE DEVICE
How to unlock the bootloader now that you have turned on this feature.
1. power off the device
2. holder volume up and power until you are at the boot menu with recovery fastboot and normal as options scroll with volume up to fastboot then press power button to select
3. once in fastboot mode you will need to option a command window on your computer and make sure you have your adb and fastboot files
4. cd to the folder with your adb and fastboot files then run these commands
5. to maks sure your devices are working correctly
fastboot devices
6. to unlock the bootloader
fastboot oem unlock
7. follow the directions on your device screen. once it is finished unlocking you can check it with
fastboot getvar all
8. Next to reboot the device use
fastboot reboot
thats it your bootloader is unlocked
Note: if you have twrp recovery install and unlock your bootloader with METHOD 2 the device will try and boot to recovery and wipe data which will fail because you and twrp installed.
The only way to fix this is to boot to fastboot mode and run this command
fastboot format userdata
then just reboot out of fastboot mode and the device will boot up.
fastboot reboot

Need help with these commands check out this video jump ahead to 6min 45sec to see commands above

Quadrooter Qualcomm Exploit

Share if the site was helpful

Quadrooter Qualcomm Exploit

Quadrooter-vulnerability-affects-nearly-1-billion-Snapdragon-powered-Android-devices

QuadRooter sounds like another serious Android security exploit. One which can apparently allow a malicious app to gain root access on Qualcomm based Android phones and tablets, enabling the app to then do pretty much what it pleases. According to Check Point, the research group that discovered QuadRooter, up to 900 million Qualcomm Android devices could be affected. This exploit targets the Qualcomm drivers which is why it is specific to this hardware. As of the Augusts 1st security update Google has patched 3 of the 4 vulnerabilities and will patch the last one in the September 1st update. To keep your device safe from these bugs it is always bests to stay on top of your security updates. One of the best ways to protect your phone from malicious software is to only download apps from google play or trusted sources.

quadrooter-scanner

If you want to check and see if your device can possible be vulnerable to this threat then you can download and run QuadRooter Scanner by check pointPersonally I am hoping that a developer can figure out this exploit and use it to get many android users root access. I am sure someone can create a app that gets root then injects supersu and su binary into the device. If you are hoping for the same I recommend not updating to new security patches and give the developers some time to get devices root access. 

I wouldn’t be surprise to see this QuadRooter vulnerability implemented into Kingroot app some time soon, as it would make there app unstoppable on Android devices. What do you think about this bug please comment below and let me know.

RootJunky

 

android stagefright exploit

Share if the site was helpful

What is Android stagefright exploit and how does it effect me? This is the question that everybody is asking so i will be trying to cover it in this post. First lets get an understanding of what StageFright is and can do to your device. StageFright is library or lib that has been around since Android 2.2 and is still being used in android 5.1.1 today. This is the reason that it is such a big exploit and called StageFright.

How does StageFright work?

The easiest way to hack into a device with StageFright is a video sent via MMS. which theoretically could be used as an avenue of attack through the libStageFright, which helps Android process video files. Many text messaging apps including Google’s Hangouts app automatically process that video so it’s ready for viewing as soon as you open the message, and so the attack theoretically could happen without you even knowing it. StageFright could also be exploited by installing a app that has the exploit in it or every by downloading a hacked video file that could run the exploit. If StageFright is implemented on your device the hacker can view and see everything that you do, bank accounts emails and more.

What can we do about it?

First you want to open your messaging app and go into settings and turn off AUTO RETRIEVE MMS. This will keep the a hack from happening automatically at least. You could still open a MMS and get it but that is still one more step that has to happen. Next don’t install apps from unknown sources, which really is always a good idea and last be careful on the Internet. Google will be working on a patch for this and pushing it out in ota updates soon. We all now how long ota updates can take so best to address this yourself.

More info

ASLR (Address Space Layout Randomization) is a method that keeps an attacker from reliably finding the function he or she wants to try and exploit by random arrangement of memory address spaces of a process. ASLR has been enabled in the default Linux Kernel since June 2005, and was added to Android with Version 4.0 (Ice Cream Sandwich). So if your device is android 4.0 and above you are much better protected.

My Thoughts

From what i have heard stagefright isnt a exploit that has been seen working in the wild just discovered by some researchers and not implemented in real world. Since it is already public I dont think that many hackers would spend the time working on it, if it is going to be patch soon anyway.

HERE you can find a StageFright detector app that is interesting but is going to tell you that you are vulnerable unless you have the latest cm12.1 installed which already has been patch for stagefright.