Android reverse for Android: how to trick apps

USB return cable = The mobile phone receives a network connection from the PC via USB.

I know how to do USB reverse binding, except for one problem: many Android apps will check the network connection using the code below before doing any useful work:

ConnectivityManager connectivityManager = (ConnectivityManager)context.getSystemService(Context.CONNECTIVITY_SERVICE); NetworkInfo info = connectivityManager.getActiveNetworkInfo(); 

The problem is that when using USB reverse fraud, the above code does not report a network connection. However, there is a network connection (which is a USB repeater), and ping, wget, and all programs that do not perform this silly check work well.

So the question is: how can I hack into the system so that this network connection check returns success (so that I can trick these applications)?

BTW. I am using Cyanogenmod 7. And any solution specific to this MOD is also welcome.

+43
android
Oct 02 2018-11-11T00:
source share
3 answers
+4
Mar 06 2018-12-06T00:
source share

If you do this a lot of hacking, I guess you will probably have your device. If so, program the shell interface to send commands to the device shell with the JNI and get the STDOUT. Use this interface to run the netcfg command, which can be parsed into an array - this will give you all the details that the API hides. It also allows you to override Androids device settings using the ipconfig command.

As for using this to send and receive from your device - in my experience - you probably have to compile a specific device module that can be loaded into the kernel at runtime. Or simply download the kernel from the manufacturer and compile the module into the kernel, and then launch the phone with a new custom kernel.

Hope this helps.

+1
Mar 02 2018-12-12T00:
source share

To do this, you need to download the file ReverseTethering_3.19.zip (Google to find the link.) Extract to the desired location.

Prerequisite : -

  • only root phones work.
  • USB debugging must be enabled.

Now connect your embedded Android mobile to the PC via the USB cable. Wait for the PC to recognize your mobile phone. Now open the extracted zip file and open AndroidTool.exe with administrator privileges.

Now click "Connect" in the Android tool.

Now it is trying to connect and install apk USB tunneling on your device. It also requests superuser rights. Provide it.

Finally, after successfully establishing a connection, you will see. https://drive.google.com/file/d/0B11p07T8VxhNNUdIM3gtTFR4N3M/view?usp=sharing (Sorry, I cannot upload the image.)

Now you get the Internet on your mobile device, and the usb tunneling application is installed. But you can only access HTTP connections (ie;) only works in chrome. Play Store apps may not work.

So, you have to fool the applications and make him believe that either the mobile phone is connected to Wi-Fi or mobile data. Only applications work.

So, you need to go to the "Tools" menu in the Android tool. https://drive.google.com/file/d/0B11p07T8VxhNRXR3aTVUZUl1dVk/view?usp=sharing

Now install hack (optional). It installs the Xposed framework and installs the hack connectivity apk. Just follow the instructions, it is easy. The connection with Hack allows applications to believe that the mobile phone is connected to WiFi or mobile data, depending on what type of hacking it did after establishing a Hack connection. Finally, after hacking, he asks to restart the computer. After rebooting, you can enjoy the Internet with the USB reverse teaser in all applications.

+1
Feb 25 '15 at 6:38
source share



All Articles