Hi All,
I'm still looking for a way to either decrypt or extract an apk from an SEUS signed/encrypted firmware.
I've tried the Sin_Reconstructor and I've tried replacing the JAR file in plugins with the one provided, but this still seems to simply download the same encrypted files it always has.
I tried to use the other plugin that was supposed to do a dump such as dump0.zip and dump1.zip however this didn't work either.
I'm using SEUS and not Pc Companion to try and get this all done.
Is there a guide anywhere out there on the net for decrypting seus firmwares. I've tried and tried and just can't seem to work out how its done.
I want to learn as much as possible, and once I've done the learning I'd love to give back everything I learn, but without understanding the basics it just feels I'm dead in the water.
Any help from anyone would be greatly apreciated.
Just out of curiousity why do you want to extract it from a signed firmware? From what I gather the decrypted roms are no different just without branding. As well I think actually decrypting rom's is for people with some solid experience in the field. If you want to get your feet wet with extracting and modifying apk's go here http://forum.xda-developers.com/showthread.php?t=714288 . I am completely new to programming as well and this is what I have learned so far. Good luck and learning android is a blast!
BTW the link only really covers visual mods. For learning android coding this is a great place to start: http://developer.android.com/index.html
the Android's SDK not contain an Android device emulator ?
If yes, you can mount the Fw on this VM and extract the APK to an sdcard emulated (HD) ...
The System's APK is in /system/app
paid APK : /data/app
Thol said:
the Android's SDK not contain an Android device emulator ?
If yes, you can mount the Fw on this VM and extract the APK to an sdcard emulated (HD) ...
The System's APK is in /system/app
paid APK : /data/app
Click to expand...
Click to collapse
So you can mount SEUS encrypted firmware on the VM now? When did that start?
Related
Hi all, I'm having great difficulty trying to extract anything from the system.img or boot.img files I got from the stock AT&T rom for the Inpsire 4G. I first had tried to unyaffs the files but I realized that HTC does not use this to package their files anymore. Next, I tried to mount in PowerISO, then unrar (both noob attempts, i know). I've read numerous places that I can mount them as a loopback device in linux but I do not a linux box ready to do this with. In fact, I just erased that HDD to install Windows 7 before I wanted to extract these files.
So my question is this: without using virtualbox or a VM or reinstalling Ubuntu again, is there any way I can extract these rom files from their img archives in Windows? I'm thinking NO but if there is anywhere I would get a definitive answer, it's here.
If not, maybe someone could package up these APK's for me? I'm primarily looking for the AT&T Wifi Hotspot apk as I constantly use McDonald's and Starbucks for WIFI and am looking to automatically authenticate the ssid as my bb Torch used to, without the agreement and landing page.
Thank you to all who look at this, and more thanks if you can help me in my endeavor.
Here I present,
An easy to use and effective, Flashable-zip(or update.zip) Signer!
There are many update-zip(flashable zip) Signers available, but this is special.
This Signer WHOLE-FILE signs your update.zips/flashable-zips, so it can pass even recovery's Signature Verification(Tested on CWM 5.0.2.8 on HTC Wildfire S)!
Unfortunately, as I am not very veryGood at C/C++ Programming, this tool does not have a Graphic User Interface(GUI).
I apologize, but as I am new to XDA, I don't know how to insert pictures, "Code:" etc, so this thread may look very ugly to you.
Oh yes! And DON'T EVER delete any file included in the zip, as it will cause the zip signer to malfunction.
I may have made this flashable-zip Signer, but I couldn't have done it without this people:
zeppelinrox ( for teaching me a little C/C++ Programming with his scripts )
The creator of signapk.jar ( an important part of this tool )
Google ( For Creating Android so that these tools can be developed )
YOU! ( for testing out my flashable-zip Signer )
And many more, who I apologize for leaving you out
Guide to using this zip signer
To Use this Signer:
1) Unzip the file(Obviously!)
2) Copy & paste the update-zip(a.k.a flashable zip) that you want to sign into that folder.
3) Run ROM Signer.bat
4) Follow the instructions in the application.
5) When it says "File successfully signed......", You are DONE!
After File signing operation succeeds, check the "signed" folder for your signed zip file.
Thank you for Using my Flashable-zip Signer!
I would appreaciate if you would hit the "Thanks" button.
Portable Java(jPortable by PortableApps.com) DIRECT link
Here are the direct links for the 32-bit & 64-bit Windows Portable version of the Java(R) Runtime Environment:
32-bit : http://jaist.dl.sourceforge.net/pro...Versions/jPortable_7_Update_25_online.paf.exe
64-bit: http://jaist.dl.sourceforge.net/pro...rsions/jPortable64_7_Update_25_online.paf.exe
Just click on the link and the Portable Java RE should start downloading!
Nice work
Marília de Oliveira said:
Nice work
Click to expand...
Click to collapse
Lol didn't expect to see you here. Hi @haoyangw long time no see mate
Hi thanks for this signer! good work!
Please if someone can help me,
i have all firmware files for the Nokia 8110 4G and im not sure how to make the META-INF file what do i need to put in there and how to do it, as im trying to sign the package and it dose not go
yowejowe said:
Hi thanks for this signer! good work!
Please if someone can help me,
i have all firmware files for the Nokia 8110 4G and im not sure how to make the META-INF file what do i need to put in there and how to do it, as im trying to sign the package and it dose not go
Click to expand...
Click to collapse
Sorry let me better understand your issue first, you want to create a flashable update.zip for installing your firmware files right? So you want to create the correct META-INF files from scratch? Do you have TWRP recovery installed on your phone already? Cos it supports a newer kind of META-INF structure that makes a lot easier. Also your firmware files are for installing into the /system partition, or to be flashed? Sorry for having so many questions haha, I can better help you if I understand the technical details
haoyangw said:
Sorry let me better understand your issue first, you want to create a flashable update.zip for installing your firmware files right? So you want to create the correct META-INF files from scratch? Do you have TWRP recovery installed on your phone already? Cos it supports a newer kind of META-INF structure that makes a lot easier. Also your firmware files are for installing into the /system partition, or to be flashed? Sorry for having so many questions haha, I can better help you if I understand the technical details
Click to expand...
Click to collapse
HI thanks for the reply,
i have all .img files for this model i want to flash, its a kaios phone, and i have the original recovery still on it, (will the TWRP recovery work on kaios?) and yes i need to create a META-INF file from scratch.
THANKS FOR MAKING THIS TOOL!!!
You just saved me from a chao of broken bootanimation issue!
I REALLY REALLY APPRECIATE YOU AND I ALMOST CRIED( •̥́ ー •̀ू )!!!
THAAANK YOU!!!!O(≧▽≦)O
Is there a Linux version
I'm trying to covert a thin-client RDP system into a standalone linux system. I'd like to run a lighthttp server on it and auto-boot it to chromium (on start up).
The device comes with a crappy RDP interface and has a method for installing software UPGRADES via FTP. --- Confirmed working.
Doing some research on the web I was able to find an update package for this device. ATTACHED AS TORRENT FILE.
Using CENTOS I've tried to extract the RAMDISK but Linux doesn't seem to know how to extract the file type. I've tried a ton of scripts from xda-devs none seem to work.
I've tried just changing the system dir to see if I can get that work but it seems that the new image doesn't take to the device. I did see that the scripts have checksum info in them but not sure how to repackage or change them to adjust for the new changes.
I do see the build.prop file with a ton of ANDROID stuff and the package is APK signed. Thus I'm thinking it's an ANDROID setup. Also I see that the device is using busybox.
Any help or ideas how to get this doing what I need it?
Thanks!
chavenor said:
I'm trying to covert a thin-client RDP system into a standalone linux system. I'd like to run a lighthttp server on it and auto-boot it to chromium (on start up).
The device comes with a crappy RDP interface and has a method for installing software UPGRADES via FTP. --- Confirmed working.
Doing some research on the web I was able to find an update package for this device. ATTACHED AS TORRENT FILE.
Using CENTOS I've tried to extract the RAMDISK but Linux doesn't seem to know how to extract the file type. I've tried a ton of scripts from xda-devs none seem to work.
I've tried just changing the system dir to see if I can get that work but it seems that the new image doesn't take to the device. I did see that the scripts have checksum info in them but not sure how to repackage or change them to adjust for the new changes.
I do see the build.prop file with a ton of ANDROID stuff and the package is APK signed. Thus I'm thinking it's an ANDROID setup. Also I see that the device is using busybox.
Any help or ideas how to get this doing what I need it?
Thanks!
Click to expand...
Click to collapse
Any ideas out there?
Bump?
Hello
I own a Chinese phone with a lot of unneeded applications.
Fortunately, the maker has given the .zip software to flash it.
I'm able to open and mount on my Ubuntu computer the .img files and I can see the .apk I would remove. So far so good.
But I bet it is not that easy....
I've tried searching but all I can find is for flashing back the ROM and not about making it.
I would also like to add an su binary at the correct place ...
So I would like to find some documentation for packing back the software and flash it to the device. An How TO would be great and/or some documentation about the process.
Many thanks in advance for your help !
Hi. I own a Uniwa A19S phone which runs Android 6. I just found out it came out of the factory with an infected SystemUI.apk file (a trojan is injected into the file).
Since the trojan can NOT be removed I badly need a clean copy of this file.
The version I'm looking for is: 6.0-1602570800 code 23 (about 5 Mb in size, other versions won't work). I searched around the net with no luck so far, therefore any help is greatly appreciated.
Thank you
Mike
1) how do you know it's infected?
2) why do you think there exist clean version of it?
Thanks alecxs for taking the time to reply.
My Eset antivirus detected this malware. I sent the file for further inspection to the ESET Malware Response Team which promptly replied with this:
Detection is correct. This malware is serving advertisements.
It has ability to download another applications and install them directly into the phone
In fact I found other applications and my phone was even hijacked and 6 calls were made to Tunisia and Morocco (but the phone company reimbursed me).
Luckily I was able to remove SystemUI.apk from the phone but as a result the phone is now crippled although functional. I was hoping to find someone with the same version of my systmeUI.apk file to restore the full functionality. Because, as you may imagine, a factory reset restores the trojan.
Mike
wallace108 said:
Hi. I own a Uniwa A19S phone which runs Android 6. I just found out it came out of the factory with an infected SystemUI.apk file (a trojan is injected into the file).
Since the trojan can NOT be removed I badly need a clean copy of this file.
The version I'm looking for is: 6.0-1602570800 code 23 (about 5 Mb in size, other versions won't work). I searched around the net with no luck so far, therefore any help is greatly appreciated.
Thank you
Mike
Click to expand...
Click to collapse
Use APKtool to unsign and decompile the apk then remove the trojan from the apk then recompile and re-sign the apk. Then replace the infected apk with your modified apk then reboot the device.
Droidriven said:
Use APKtool to unsign and decompile the apk then remove the trojan from the apk then recompile and re-sign the apk. Then replace the infected apk with your modified apk then reboot the device.
Click to expand...
Click to collapse
Thanks Droidriven for the instructions. I've never decompiled an apk file, this is new territory for me. But I'll look into it and will do my best.
Cheers
Mike
So I installed APKtool, and managed to decompile the apk. However, since I'm no expert here, I really don't know how to go about locating the viral payload and properly remove it without affecting the legitimate code during the process .... hmmmm ... I'm winging it here ....
wallace108 said:
So I installed APKtool, and managed to decompile the apk. However, since I'm no expert here, I really don't know how to go about locating the viral payload and properly remove it without affecting the legitimate code during the process .... hmmmm ... I'm winging it here ....
Click to expand...
Click to collapse
check the META-INF for permissions and apk data
Please bear with me because I'm confused. I really don't know what to look for.