I have scoured the interwebs for a solution, yet found only obsolete and empirically ineffectual methods, aka "setprop net.dsn1" etc., none of which persist, neither immediately after the issued command nor, especially, after a reboot.
Please allow me to make it clear, that I find it perverse and loathsome that an "app" would be necessary to accomplish this feat. The indolent '"app" mentality', which is the sadly presumed remedy for nearly every action other than involuntary motion, is a contract with the assassin of freedom – and I abhor it venomously.
I have owned an Android (presently with CM11 ROM installed, with TWRP recovery) device for two weeks. It is the first Android device (or smart, tablet, etc.) I've ever owned or dared t fuss with. I particularly purchased the Samsung Galaxy Tab Pro 8.4 because it was supported by CM. I am normally a Linux user and value my liberties of hack-ability. Oddly, I was able to successfully configure my DNS via a terminal emulator within my Android device, but recent updates seem to have thwarted my efforts. Apparently, resolv.conf no longer exists and some fundamental changes have been implemented, though this is all new to me and I ain't sure.
I believe that a user should be able to configure their own DNS (amongst other things) and therefore request assistance from the wizards of xda. Google is simply unacceptable, and Verizon hijacking plain makes me mad.
Show me the way, to 208.67.222.222!
Hi there,
I'm sorry but I can't find anything related to your question/device.
Please post that in the forum bellow for more answers from the experts:
> Android Development and Hacking > Android Q&A, Help & Troubleshooting
Good luck
Thanks for the referral.
Thread closed at OP's request.
Related
I'm not too sure where to post this, or if I'll receive help on this one, but I need assistance from someone experienced with these kind of attacks.
What I'm looking to do is to prevent attacks from apps like dSploit that involve things such as session hijacking and password sniffing. The reason being is my brother is using his rooted Android phone to perform attacks on my devices (another Android phone and Windows 8 PC), and has been able to access my Facebook messages, etc.
I've installed an app on my Android phone called WiFi Protector, which seems to work for the most part, yet I'm still unsure if it fully prevents his attacks. I have yet to find a way to prevent these attacks on my Windows 8 PC.
I also cannot kick him off from the WiFi connection, meaning unless I can find a way to prevent his attacks, he will always be able to snoop on or attack everyone connected to our router.
If anyone can help in this area as soon as possible it would be greatly appreciated!
Hi there,
I'm sorry but I can't find anything related to your question/device.
Please post that in the forum bellow for more answers from the experts:
> Android Development and Hacking > Android Q&A, Help & Troubleshooting
Good luck
Did several searches here on XDA and with Google before posting this thread-
I purchased an LG V400 Gpad 7 a week ago. After rooting it I installed OS Monitor, busy box , a terminal emulator and Droidwall- I have a little bit of experience with Android but am by no means knowledgeable.
The tablet does not have a place for a SIM card i.e. wifi only. I find even using Droidwall to try to cut down connections to the outside world, that there are a bunch of TCP6 connections either close/wait or ack/wait or established. I have been using Elixir to discover processes and kill or disable them when possible. Many times kill only results in a respawn. In addition to this killing isn't persistent i.e. next reboot everything is back. A number of them for example LG Hidden menu, G System server, LGATCMD service - and others- seem to want to 1)establish outside connections 2) looking at their permissions, they want to know everything and 3) some of them aren't killable even through the terminal emulator i.e. kill -9 pid#.
I like what the tablet allows me to do. I don't like everything talking to the world in process of this. Couple of questions 1) is there a way to get rid of this crap- why for example since its not a phone do I need LG Hidden menu running and establishing outside connections and 2) Anyone know of a ROM here on XDA that might work with this tablet?
Thanks for all of the expertise here - any suggestions would be deeply appreciated..
Expat
Hi there,
I'm sorry but I can't find anything relevant to your question/device.
Please post that in the forum bellow for more answers from the experts :
> Android Development and Hacking > Android Q&A, Help & Troubleshooting
Good luck
HOW TO ANSWER/REPLY:
The primary FORMAT of ANSWERS/REPLIES I'm looking for are of 2 kinds:
1. RESOURCE NAME: & URL LINK (Where to Ask/Look for this Info)
~&~
2. COURSE/VIDEO NAME: & URL Link
ULTIMATE GOAL:
I am interested in making a series of ScreenCasts (with slides) on use of dd to gather info on Android partitions (along with cat of info in sys), copy, clone, over-writing, and flashing ROMs.
RESEARCH STRATEGY:
I'm looking for the approach others have used for similar content. There are now literally dozens of MOOCs (Udacity, Udemy, and Coursera are excellent!) and other sites (some NGO, some For-Profit) with fairly good instructional design on Android internals. Rather than re-invent the wheel, I'm interested in finding VIDEOS (or hybrid content, plus videos), which include instruction and/or example of use of dd (or forked/derivative software) in the context of Android.
UNSUCCESSFUL PRIOR SEARCHES:
Yes, I already know that I may have to just settle for a precedent of Linux/FreeBSD videos, and/or prior art which only covers dd in the context of data rescue (disk imaging, forensics, etc.). And yes, I also know that Google and YouTube advanced keyword searches are amazingly useful, but I am hoping someone else can help me out, perhaps with just some obscure YouTube playlist that's relevant, or a course with a specific section that includes something like this.
WHY AM I ASKING THIS HERE?:
Unfortunately, I don't even know where to ask this question, and I've had terrible luck when trying to ask similar questions to this on other websites!?! But I know that XDA is where lots of Android experts reside
Thanks,
Paul
.
Hi there,
I'm sorry but I can't find anything related to your question.
Please post that in the forum bellow for more answers from the experts:
> Android Development and Hacking > Android Q&A, Help & Troubleshooting
Good luck
Does a comprehensive and plain english list exist anywhere that tells who is who and why they have a security certificate installed on my android phone?
I've asked this before and never found an answer. I find it odd that it isn't questioned and recently when installing FoxFi, it was made more poignant when many became up in arms about the FoxFi cert and the notification that some unknown entity could be monitioring activity. FoxFi is pretty clear about why that cert is there and I can't say that for the factory installed ~200 certs.
Also, is there a comprehensive list anywhere that tells what factory installed and system apps do? Many have very obscure names and even names which are quite misleading upon actually discovering what they really do. I'm sure I can't be the only one that would like to know exactly which apps are safe to freeze, disable or uninstall and upon doing so, what functionality will be lost or what other apps will no longer work, if any.
I think Google needs to step things up in these two areas so people can actually know. The work in the area of app permissions is a step in that direction, but, still a long way from full and forthright disclosure aimed at educating all android device owners.
Thanks for any direction you can provide.
Hmmmmm.... its merely about the desire to know why every android I've owned for coming on ten years now has security certs installed belonging to the DOD, Japanese Government, Experia, Equifax and many more that I have no idea who they are unless I want to research each and everyone of them. Even doing so in most cases still doesn't reveal why those entities have a cert on my phone and what it actually means. I wonder what happens if they are removed and why they are there in the first place.
As far as the many pre-installed apps that I can't imagine many people having a clue as to why they are installed or what they actually do, well, that kinda speaks for itself as well.
Nobody else wonders or does everyone else but me already know?
However, in the mean time, I'll refine my quest to changing permissions and any insightful threads on that for dummies would be appreciated.
Thanks
Hi
Thanks for writing to us at XDA Assist. Unfortunately I can't find anything relating to your question on XDA, it's probably best to ask here:
Android Q&A, Help & Troubleshooting
No response in two days, thread closed.
Hi, I recently paired my samsung galaxy note 5 bluetooth with a stranger, who wants me to transfer a video i was taking for an event. I paired and transferred the video over to him but I cancelled it mid-way coz the file was over 700MB in size. The whole process probably took about half to 1 minute. My concern here is whether within that short period of time, was there any possibility that my phone would have been compromised, hacked and my personal data taken ? Thanks.
XDA Visitor said:
Hi, I recently paired my samsung galaxy note 5 bluetooth with a stranger, who wants me to transfer a video i was taking for an event. I paired and transferred the video over to him but I cancelled it mid-way coz the file was over 700MB in size. The whole process probably took about half to 1 minute. My concern here is whether within that short period of time, was there any possibility that my phone would have been compromised, hacked and my personal data taken ? Thanks.
Click to expand...
Click to collapse
Hello, and welcome to XDA!
It's conceivable. BlueJacking, BlueSnarfing, and BlueBugging exists. And personal info is rather small. Not to freak you out, in that time it's possible for the other device to download your encrypted passwords top be cracked at a later point.
Probable is a different question. Depends partly on how much you trust this stranger. Personally, I would be looking to change my passwords just in case.
Most relevant threads to your situation:
> General discussion > General > Bluetooth "hacking"
> Android Development and Hacking > Android Apps and Games > Bluetooth hacking.
Most relevant thread to your device:
> Samsung Galaxy Note5 > Galaxy Note5 Q&A, Help & Troubleshooting > [Help Thread][Galaxy Note5] Ask Any Question, Noob Friendly
If you wish to post in any of the threads, please note you will need an XDA account.
Hope this helps.
Hi Jim, thanks for the info and pointing out to me the right threads to go to. I will post my questions in the relevant threads. I have also registered myself an XDA account.
On your comments on resetting the passwords, I think I will do it. Though it will be quite a big exercise. But better to be safe than sorry. Anyways, curious to know, besides my encrypted password,s what are the other data that someone might be able to retrieve via bluetooth within that short period of time?
Cheers,
Raymond
OfficerJimLahey said:
Hello, and welcome to XDA!
It's conceivable. BlueJacking, BlueSnarfing, and BlueBugging exists. And personal info is rather small. Not to freak you out, in that time it's possible for the other device to download your encrypted passwords top be cracked at a later point.
Probable is a different question. Depends partly on how much you trust this stranger. Personally, I would be looking to change my passwords just in case.
Most relevant threads to your situation:
> General discussion > General > Bluetooth "hacking"
> Android Development and Hacking > Android Apps and Games > Bluetooth hacking.
Most relevant thread to your device:
> Samsung Galaxy Note5 > Galaxy Note5 Q&A, Help & Troubleshooting > [Help Thread][Galaxy Note5] Ask Any Question, Noob Friendly
If you wish to post in any of the threads, please note you will need an XDA account.
Hope this helps.
Click to expand...
Click to collapse
raytss said:
Hi Jim, thanks for the info and pointing out to me the right threads to go to. I will post my questions in the relevant threads. I have also registered myself an XDA account.
On your comments on resetting the passwords, I think I will do it. Though it will be quite a big exercise. But better to be safe than sorry. Anyways, curious to know, besides my encrypted password,s what are the other data that someone might be able to retrieve via bluetooth within that short period of time?
Click to expand...
Click to collapse
I'm no expert on security; what else comes to mind is IMEI and cell phone number, maybe even address book. Unlike the password things, there really isn't any control over mitigating that.
Hopefully your encounter was on the up-and-up.