So I have the PNC smart access (for PNC's prepaid card) app and it requests SUPERUSER.. *gasp*
App here: https://play.google.com/store/apps/details?id=com.monitise.mmb.client.android.pncSmartAccess
I've done some tests and apk break downs and I've found out this.
1. Using root cloak on it will not allow me to login and will throw some error. (on a unsupported xposed lollipop device now so I can't show screenshots)
2. Lucky Patcher doesn't show any ACCESS_SUPERUSER modules in the apk. Wat? yet......
3. SuperSU has a record of PNC Smart Access of requesting superuser in its log. Speaking of SuperSU...
4. Denying it access will allow me to login but only after I have to send a email verification. EVERY TIME I WANT TO LOGON IT NEEDS TO VERIFY MY EMAIL.
5. I spoke to PNC tech support and they didn't know jack what I was talking about.....
6. I have not given the app superuser permissions so I can't see the effect of it being allowed.
Maybe someone can look at the APK and solve this mystery??
Sent from my SM-G900V using XDA Free mobile app
stanleyopar2000 said:
So I have the PNC smart access (for PNC's prepaid card) app and it requests SUPERUSER.. *gasp*
I've done some tests and apk break downs and I've found out this.
1. Using root cloak on it will not allow me to login and will throw some error.
2. Lucky Patcher doesn't show any ACCESS_SUPERUSER modules in the apk. Wat? yet......
3. SuperSU has a record of PNC Smart Access of requesting superuser in its log. Speaking of SuperSU...
4. Denying it access will allow me to login but only after I have to send a email verification. EVERY TIME I WANT TO LOGON IT NEEDS TO VERIFY MY EMAIL.
5. I spoke to PNC tech support and they didn't know jack what I was talking about.....
6. I have not given the app superuser permissions so I can't see the effect of it being allowed.
Maybe someone can look at the APK and solve this mystery??
Sent from my SM-G900V using XDA Free mobile app
Click to expand...
Click to collapse
That's strange.
There's some enterprise email clients who won't allow their email on a rooted device....
@Newyork!
Yeah... And more so that their isn't any trace of superuser access request permissions in the app... Wtf?? Yet supersu generates a "toast notification" about superuser access being denied
I'll supply screenshots when I get home. XDA app won't let me upload photos...
Sent from my SM-G900V using XDA Free mobile app
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Also PNC SmartAccess dodges SuperSU logger. It just shows "exit" in the logger after setting both app and option as FULL ACCESS. (with allowing it SuperUser of course >_<)
I'm going to logcat and see if anything else turns up
Related
I was just wondering if Google or anyone else had noticed this loophole?? Download a paid App, back it up to your SD card, get a refund for the paid App and then reinstall using the backed up App.
It isn't something I have done or will do but was wondering if this does actually affect things or the App??
Sent from my X10i using XDA App
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
That is interesting but I don't think so.
Doing that would be the same as downloading warez...not welcome on XDA
You won't have access to future updates, also, doing this regularly makes you a douchebag.
Like I say, it isn't something I do and I support the Android community. Was just thinking that it seemed such an easy way to exploit the Market and maybe Google should do something about it.
Sent from my X10i using XDA App
Not being an actual developer I may have some details off, but...
I think Google implemented an app authentication API that checks with the mothership when you run a program to see if your Google account is authorized to run the app.
I ran into an issue with this (I really should let the developer know, don't know if it was an issue of the API, or their implementation) with Locus Pro. I had been using the free app for a while and decided that I liked the app enough to throw some dough towards the developer. So, I purchased and downloaded the Pro version and immediately threw it on the SD card (Moto Droid1, <256M for apps... need every Meg I can get...). First time I tried to run the program it started up and then popped up a notification stating that I wasn't authorized to use the app. I moved it back onto the phone and ran it again. This time it worked. Then I moved it back to the SD card and haven't had an issue since. I'm hoping that the app doesn't decide to check with the mothership next month (when I'll be heavily using it) while I'm in Sweden w/o a data connection.
What about all of those tablets that don't have the Market installed? Surely these Apps can be sideloaded and there would be no way to check the validity of these Apps.
Sent from my X10i using XDA App
As stated above, weather it works or not, it would be considered warez and everyone knows our stance on it.
Thread Closed
Since when did we get adds in the notifaction bar [IMG]http://i1195.photobucket.com/albums/aa381/cjward23/CAP201105141720.jpg[/IMG]
Does anyone know what app I might be using that could cause this?
Sent from an ice cream sandwhich
I believe airpush got in trouble for that...are you using airpush?
That sucks. Im sure its against Google policy.
Sent from my PC36100 using XDA Premium App
Unlock my wifi free version did
LOL Link fail
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Looks like airpush ( http://www.airpush.com/ ). Install any new apps recently? Have any apps that ask for these permissions:
INTERNET
READ_PHONE_STATE
ACCESS_NETWORK_STATE
RECEIVE_BOOT_COMPLETED
Click to expand...
Click to collapse
plus optionally these:
VIBRATE
ACCESS_COARSE_LOCATION
ACCESS_FINE_LOCATION
Click to expand...
Click to collapse
Of those the boot completed one would stand out the most. One way to try and find out would be to reboot the device and then immediately check what apps are running before doing anything else.
http://www.airpush.com/
What apps do you have installed? When you find the one doing it post the name of it so everyone can report it as malware
I hacked up a simple app that will search for installed apps using airpush: http://kllrnohj.com/android/FindAirpush.apk
(for those so inclined, the is source here: http://kllrnohj.com/android/FindAirpush.zip )
kllrnohj said:
I hacked up a simple app that will search for installed apps using airpush: http://kllrnohj.com/android/FindAirpush.apk
(for those so inclined, the is source here: http://kllrnohj.com/android/FindAirpush.zip )
Click to expand...
Click to collapse
Ok it's an app called "easy filter call and SMS blocker" which had now been removed from my phone.
It does mean I now need to find a new way to block my mum's calls and texts.
Sent from an ice cream sandwich
cjward23 said:
Ok it's an app called "easy filter call and SMS blocker" which had now been removed from my phone.
It does mean I now need to find a new way to block my mum's calls and texts.
Sent from an ice cream sandwich
Click to expand...
Click to collapse
There are tons of call blockers out there, have you tried the root call blocker app? Not sure if it blocks sms as well, but I've heard great things about it. You can always use Handcent or another SMS app and blacklist the numbers you want to block.
Sent from my Evo using Tapatalk
Thank you for this great service.. You've helped me regain my sanity!
Hello
Information:
Just 2 hours ago I have been hacked and I think that was in my phone. I was making a paypal payment to a friend using the paypal app when sudently, seconds after sending the payment I received a mail of paypal with that transaction and another one of 2.500€ that obviously I never did.
The payment was never make because I don't have so many funds, but they tried 5 times with different quantities and all of my cards. Well, after seeing this I changed my password and all of that **** and right now I want to know before I make a clean rom install if I could investigate where the hack came from.
I am using a Galaxy note 3, it is rooted but limited apps have access to root and I also use xprivacy.
The apps with access to root and the xposed modules are this ones
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
and my rooted apps
Hacker paypal data
The data of the money receptor is:
Sent to: Enrique Gallardo Boto (The recipient of this payment is Non-US – Verified)
Email: [email protected]
What I want
I want to investigate if is possible a little bit more of this. I was thinking on restoring a Titanium of all my apps to yesterday, open logcat or any app that can help me to know where the leak came and what app was the malware and try to make another legit transaction to see if happens anything from my phone.
The problem is that I don't really know how should I proceed and I want to solve this for me and more people.
Any idea?
Is the network you used secure out of curiosity? What kind of apps do you have as far as security just curious?
You could try taking a look at some of the applications' play store reviews as well as the modules' forum threads to see if anything had been reported. I'm always very cautious with root permissions, hard to always know what an app will use it for. Personally I stick to my PC for transactions and stay as far away from Google wallet as I can
Sent from my SCH-I605 using xda app-developers app
There's a VirusTotal app you could try, maybe one of your apps is malicious. But if you'd know how to, I'd also just copy all the apps to your PC and then upload them to VirusTotal that way, it'd be a lot easier.
There's also some pc malware out that can infect your phone even. I'd run a decent anti virus on both your phone and your pc as well. (I like Kaspersky, Malwarebytes and ESET personally).
The other thing too is maybe your passwords are just really weak. I'd recommend a password generator like Keepass.
Fyi only
Jus saw this https://blog.lookout.com/blog/2014/03/06/dendroid/ dendroid malware can takeover ur cam and audio and sneak into your googe play.. features:
Ability to intercept and block SMS received by the target device
Download Pictures from the target device
Spy on the user by taking pictures or making audio and video recordings
Download the user’s web browser history and any saved bookmarks
Download any other accounts (email, social media, VPN) stored on the device
Send texts as the device owner
Record any ongoing calls
Open a dialogue box to ask for passwords or send messages to the victim
Hy guys,
Story:
So I have been using Phronesis rom for a while now, and I was always bothered by 1 thing...
Whenever an update came from Play store or I was restoring my backed up apps, I was constantly getting popups to check if I want the app to access every permission.
Basically this method will disable this, but you will also lose the option to set permissions for apps.
Annoying popup: (It is asking for camera permission here)
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Method: (It should work on any rom that uses the same application for permissions)
1. Get Titanium backup (or any app that can freeze system apps)
2. Freeze this system app: com.sec.android.app.capabilitymanager
3. Enjoy
Positive effects:
-No annoying popup on installing apps
-Installing any app is faster
Negative effects:
-Can't control app permissions.
Screenshots:
App Ops application: (com.sec.android.app.capabilitymanager)
Apps Ops application in recent apps: (com.sec.android.app.capabilitymanager)
There is what you lose: (Setting > Applications > Application Permissions)
BEFORE
AFTER
I hope you guys will find it useful
For me it was almost a lifechanging discovery
Enjoy ^^
Minti
MintiIceCream said:
Hy guys,
Story:
So I have been using Phronesis rom for a while now, and I was always bothered by 1 thing...
Whenever an update came from Play store or I was restoring my backed up apps, I was constantly getting popups to check if I want the app to access every permission.
Basically this method will disable this, but you will also lose the option to set permissions for apps.
Annoying popup: (It is asking for camera permission here)
Method: (It should work on any rom that uses the same application for permissions)
1. Get Titanium backup (or any app that can freeze system apps)
2. Freeze this system app: com.sec.android.app.capabilitymanager
3. Enjoy
Positive effects:
-No annoying popup on installing apps
-Installing any app is faster
Negative effects:
-Can't control app permissions.
Screenshots:
App Ops application: (com.sec.android.app.capabilitymanager)
Apps Ops application in recent apps: (com.sec.android.app.capabilitymanager)
There is what you lose: (Setting > Applications > Application Permissions)
BEFORE
AFTER
I hope you guys will find it useful
For me it was almost a lifechanging discovery
Enjoy ^^
Minti
Click to expand...
Click to collapse
Not working on. Any other ways to disable this? Its annoying
IzArsha said:
Not working on. Any other ways to disable this? Its annoying
Click to expand...
Click to collapse
I don't know any other methods right now. Sorry :/
im using a new S9+ now i really miss this function that i had on my S-NOTE3 ... do you know if that possible to install this feature as an app ?
Last post 2016 .
You/ Dev not on XDA for a year .
Hi All.
I'm using shamiko magisk module together with Hide My App list but still when test detecting root magisk and lsposed still detected under PM intent Queries.
How do I improve it further?
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I doubt there is anything you can do. The reality is that root can be sniffed out in MANY ways and it's just a matter of how much work the app dev wants to put into discovering it. I have a credit union, Security Service Federal Credit Union, that their app detects root no matter what I have tried. You can't even get to the login page, the app throws up a security error and won't continue. I just don't use their app anymore.
fuadhdmini said:
I'm using shamiko magisk module together with Hide My App list
Click to expand...
Click to collapse
Me too. How were you able to circumvent "moe.shizuku.redirectstorage" in 'Libc File Detection' and 'Syscall File Detection'?
iamMG said:
Me too. How were you able to circumvent "moe.shizuku.redirectstorage" in 'Libc File Detection' and 'Syscall File Detection'?
View attachment 5788097
Click to expand...
Click to collapse
I guess by hiding those apps from the detecting app in the hide my applist lsposed module.
But your PM Intent Queries all cleared, how?
fuadhdmini said:
I guess by hiding those apps from the detecting app in the hide my applist lsposed module.
Click to expand...
Click to collapse
Well, Storage Isolation is added to the Template, and, thus, is hidden from Applist Detector. What does your Template look like?
fuadhdmini said:
But your PM Intent Queries all cleared, how?
Click to expand...
Click to collapse
I don't know how I achieved that. But you can read my setup at the bottom of this post of mine.
You don't have to perfectly hide it. You can treat it app by app i think,
for example, my bank app only detect developer option state, so i hide it using IAmNotDeveloper modules,
other app scan for root app, so i hide it using HideMyAppList,
for the rest, Shamiko and DenyList do the job for me already.
I use Magisk Delta (not canary/beta) by HuskyDG which is a modded version of original Magisk.
I had a banking app which with frequent updates deteta most of the ways. Finally i used shamiko + airfrozen + other normal steps to hide magisk. With magisk delta it has the old magisk hide implemented along with zygisk and its very easy to hide apps now in single denylist. No further steps or apps required. You can try out this if you wish.
Where is this?