Hello, how can I block this ip address that I have captured with the PCAPdroid app?
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Methods I've tried:
/system/etc/hosts file
I tried changing my DNS addresses. (Auto, 8.8.8.8, 94.140.14.14)
The apps I was able to uninstall were uninstalled and tested.
I unpacked the boot.img and checked the unencrypted files and couldn't find a trace.
VPN tried. I don't remember their names, I tried at least 5 apps.
I have tried many net traffic capture apps.
No app other than PCAPdroid was able to capture this ip address.
AFWall+ only caught this ip address once, but when I tried to go to the logs, the application crashed.
Then I solved this problem by using the old design in the log section, but it could not catch this ip address again.
AFWall+
Apps blocked one by one.
All apps were blocked.
All apps were allowed.
These operations were also performed at the system level and the kernel level.
Log records opened.
I tried blocking using the iptables in Terminal. Commands i tried:
iptables -I INPUT -s 91.193.5.50 -j REJECT
ip6tables -I INPUT -s 91.193.5.50 -j REJECT
iptables -I INPUT -s 91.193.5.50 -j REJECT --reject-with icmp-host-prohibited
ip6tables -I INPUT -s 91.193.5.50 -j REJECT --reject-with icmp-host-prohibited
iptables -I INPUT -p udp --dport 51820 -j REJECT
iptables -I INPUT -p tcp --dport 51820 -j REJECT
iptables -I INPUT -p udp --dport 55818 -j REJECT
iptables-save
ip6tables-save
According to my checks, the iptables table is reset every 1-2 minutes (without reboot).
That's why the above 2 methods don't seem to work.
A connection is established with this IP address every two or three minutes.
I deleted the /system/bin/iptables-restore file.
It was automatically regenerated after a few minutes.
When I delete it again it is no longer created automatically but iptables still keeps resetting.
Why did I try so hard?
If I can't prevent this ip address or something else after all, I'm getting obsessed and want to find a solution.
I don't know much about the Android system.
Sorry for the long post.
Add the IP to Android's hosts file.
Have you found which app installed on your device is attempting to connect that ip address?
xXx yYy said:
Add the IP to Android's hosts file.
Click to expand...
Click to collapse
I explained that I had already tried this. Thanks for your response.
James_Watson said:
Have you found which app installed on your device is attempting to connect that ip address?
Click to expand...
Click to collapse
I haven't found it yet.
bugattiveyrontr said:
I explained that I had already tried this. Thanks for your response.
Click to expand...
Click to collapse
IMO blocking an IP through hosts file is sufficient: don't waste your time with finding another solutions.
xXx yYy said:
IMO blocking an IP through hosts file is sufficient: don't waste your time with finding another solutions.
Click to expand...
Click to collapse
bugattiveyrontr said:
I explained that I had already tried this. Thanks for your response.
I haven't found it yet.
Click to expand...
Click to collapse
UDP 51820 is default for Wireguard VPN
that maching is a server alright with all the bells and whistles
does the name webcitynews.com rign a bell?
the IP is on 2 blacklists just so you know
dnsbl.dronebl.orgYesAbused VPN Service
dnsbl.spfbl.netYes
DNSBL check page
matrix.spfbl.net
it can be normal to see UDP inside a LAN else the Internet wouldn't work
iusr419 said:
UDP 51820 is default for Wireguard VPN
that maching is a server alright with all the bells and whistles
does the name webcitynews.com rign a bell?
the IP is on 2 blacklists just so you know
dnsbl.dronebl.orgYesAbused VPN Service
dnsbl.spfbl.netYes
DNSBL check page
matrix.spfbl.net
it can be normal to see UDP inside a LAN else the Internet wouldn't work
Click to expand...
Click to collapse
Thank you for your explanation.
I did not use Wireguard VPN.
"webcitynews.com" I've never come across this address.
I solved the problem. But I'm not sure which one exactly fixed this problem as I've done a lot of things. I will write the steps I did below.
I checked iptables and ip6tables and there are no records that I added. So the solution is not here.
I updated some system apps.
Samsung Smart Manager
Samsung Calculator
Samsung Experience
In my current hosts file
127.0.0.1 91.193.5.50 (I previously added)
::1 91.193.5.50 (I previously added)
:: 91.193.5.50 (I added this later)
I turned off the services that I do not use with the app called "Blocker".
app link
The output of the ifw rules of the services I have disabled. Rules can be applied through the application.
Warning: I am sharing this because it is one of my solutions, you do not have to download it, and there may be services that you use that I do not use, and these services can be turned off with these rules. ifw.zip
I sincerely thank everyone for your help.
Awesome the problem is solved! Thanks for sharing the solution.
Related
Introduction
This is the first release of an installable package to allow google android phones to connect to Cisco like VPN concentrators.
Details
The installing phone will require:
* Root user privileges on the phone.
* /dev/tun file
* Kernel with tun support (or tun module). (cyanogen should be good)
* A cisco, nortel or freeswan ipsec server to connect to.
How To
Installing this version
This is available in the android market as a free application. It should be called VPN Connections. (Not sure where it will be listed as yet).
The latest version of the application can also be downloaded from here and installed using adb.
Reporting bugs
Please inform us which ROM and version that you are using, if the /dev/tun exists, its permissions, and the output of logcat from a boot, also the version of this application that you are running.
If your ROM and version are already reported in the issue list, please comment in the thread as there has been some inconsistencies in reports.
Please be very careful when lodging a bug as it may contain company confidential information. Be sure to strip any secrets or passwords from the configuration files or debugging information.
http://code.google.com/p/get-a-robot-vpnc/issues/list
Known issues
May need to load the tun module manually first.
Usernames can not contain the @ symbol.
Does not currently work with one time pass devices (Rsa keys).
Reserved for changelog.
no longer needed.
I'm not trying to ping via DNS name, so dont be worred about that. I know the other hosts are up, reachable and pingable.
Tried TCP and ICMP connections.
Unfortunately I don't have any ideas for you.. I'd like to play with it some myself though, would love to have VPN working. Could you send me / post the compiled binaries? saiboogu [at] g mail
Thanks and good luck
Sent to said address.
A little more information.
When tcpdumping the connection, packets originating from the phone go out through the device.
When tcpdumping the connnection with packets originating from the internal network through the vpn, i can tell they make it to the rmnet0 device, but never make it to tun0 device.
Ok, so I have it working now ! Wahoo.
So.. going to tidy the code up, Clean up the shell script to be android specific (and set the DNS servers).
Great. Would be awesome if you could share your binaries. What about joining this project and submitting what you did?
Tried mailing the owner of the project, many weeks ago. No response. Guess its dead.
I'm going to try to get a build environment setup for the major releases. Please PM me within the next 7 days if you are interested.
I plan to not only release the binaries, but the source code and build environment also. Hopefully the upstream developers will also take my patches.
Is it possible to connect with this vpnc to a cisco concentrator 3000 vpn?
We use CiscoVPN at our University and it would be nice if Android will be able to connect to it.
N23 said:
Is it possible to connect with this vpnc to a cisco concentrator 3000 vpn?
We use CiscoVPN at our University and it would be nice if Android will be able to connect to it.
Click to expand...
Click to collapse
I got a copy of this a few days ago from ungamed.. At first I couldn't connect to our 3000 because I was lead to believe our concentrator only supported TCP NAT traversal (which isn't supported by vpnc), but after talking to someone who knew his stuff a little better, I connected via UDP and had no problems.
So, short answer -- as long as your concentrator is configured to accept some form of NAT traversal other than TCP, this should work.
Oh, and like ungamed said the DNS still needs some work. Not a problem for me, when I VPN to work I only need a single domain that I went ahead and put in my /etc/hosts
Awesome work
Hey guys,
Let me know if you can provide a package.
Would love trying this out.
Thanks,
Kiran.
You can find out a first download here. http://code.google.com/p/get-a-robot-vpnc/downloads/list
This is the console part of the project, not the GUI, I'm still building that this week. Requires a rooted phone 1.5 or above.
I think that the dns is fixed in this first download
Ungamedplayer said:
You can find out a first download here. http://code.google.com/p/get-a-robot-vpnc/downloads/list
This is the console part of the project, not the GUI, I'm still building that this week. Requires a rooted phone 1.5 or above.
Click to expand...
Click to collapse
It only works with Cupcake? That's bad because yet there's no (fully working) UK Cupecake out
But thank you very much! Maybe then the nice GUI is ready ;-)
N23 said:
It only works with Cupcake? That's bad because yet there's no (fully working) UK Cupecake out
But thank you very much! Maybe then the nice GUI is ready ;-)
Click to expand...
Click to collapse
Working on the interface is slower than me doing the actual port.
Thumbnail::
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Full Shot Preview
I tried to use that package
I can get vpn connecting, but the apps do not use that tunnel afterwards.
Code:
# ./vpnc /data/data/org.codeandroid.vpnc/etc/vpnc/vpnc.conf --debug 1 --no-detach
vpnc version ERSION
Script: not found
IKE: not found
Perfect: not found
IPSec: not found
IPSec: not found
IPSec: not found
Xauth: not found
Xauth: not found
IKE SA selected psk+xauth-aes128-sha1
NAT status: no NAT-T VID seen
got address *************
Script: not found
IKE: not found
Perfect: not found
IPSec: not found
IPSec: not found
IPSec: not found
Xauth: not found
Xauth: not found
IPSEC SA selected aes128-sha1
VPNC started in foreground...
vpnc[2366]: can't open pidfile /var/run/vpnc/pid for writing
Do I need to call something afterwards?
Btw it did not work to pass --script to /data/data/org.codeandroid.vpnc/etc/vpnc/vpnc-script so I copied that script to the default location /etc/vpnc/vpnc-script...
maybe its not executed properly?
[deleted]
If it weren't for things like this, I'd still be a fan of Dolphin Browser.
Ever since the 'webzine' 'feature' came out (in version 6), this app forwards the URL of:
Every link you click.
Every search you enter.
Every page you load.
To: http://en.mywebzines.com/v3/columns?u=(URLencodedURL)&t=(TIMESTAMP)
This includes:
SSL URLs.
QUERY_STRINGS.
IP addresses on private networks and file:// urls.
In addition, when I mentioned this on http://blog.dolphin-browser.com, the comment awaited moderation for two days before being deleted. I've yet to receive an email.
Proof:
Code:
[[email protected]]~# ngrep -P '!' -lq -R -W single -M '(^GET|^POST|^Host:|^[^ ]ookie:)' "tcp port 80"
interface: eth0 (10.23.1.0/255.255.255.0)
filter: (ip or ip6) and ( tcp port 80 )
match: (^GET|^POST|^Host:|^[^ ]ookie:)
T 10.23.1.220:60126 -> 107.20.41.53:80 [AP] GET /v3/columns?u=http%3A%2F%2F10.23.1.254%2F&t=1319574537635 HTTP/1.1!!Authorization: cd7f573ec9e6e865a28aaab7a1793796!!Accept-Encoding: gzip!!Host: en.mywebzines.com!!Connection: Keep-Alive!!!!
(less spammy proof)
[G] www.google.com:80/search?q=wut
[G] en.mywebzines.com:80/v3/columns?u=http%3A%2F%2Fwww.google.com%2Fsearch%3Fq%3Dwut&t=1319574984926
[G] en.mywebzines.com:80/v3/columns?u=https%3A%2F%2Fwww.google.com%2Fsearch%3Fq%3Dwhat%2Bis%2Bthis%2Bi%2Bdont%2Beven&t=1319575011872
[G] en.mywebzines.com:80/v3/columns?u=file%3A%2F%2Fsdcard%2Fdata%2Fhome.html&t=1319575109160
Stick this in your /system/etc/hosts to make the Orwellian nightmare stop. This will break webzine 'functionality', and is only possible on rooted phones:
Code:
127.0.0.1 en.mywebzines.com mywebzines.com
Alternatively, here is how to remove this via APKTool:
Code:
* apktool d mobi.mgeek.TunnyBrowser-1.apk
* apply the this patch to smali/mobi/mgeek/TunnyBrowser/WebViewCallbackHandler.smali
#####
--- orig-7.0/smali/mobi/mgeek/TunnyBrowser/WebViewCallbackHandler.smali 2011-10-22 11:41:43.000000000 +0000
+++ mobi.mgeek.TunnyBrowser-7/smali/mobi/mgeek/TunnyBrowser/WebViewCallbackHandler.smali 2011-10-22 11:40:18.000000000 +0000
@@ -2189,7 +2189,7 @@
.line 576
:cond_2
- invoke-direct {p0, p1, v0}, Lmobi/mgeek/TunnyBrowser/WebViewCallbackHandler;->a(Lcom/dolphin/browser/core/IWebView;Ljava/lang/String;)V
+# invoke-direct {p0, p1, v0}, Lmobi/mgeek/TunnyBrowser/WebViewCallbackHandler;->a(Lcom/dolphin/browser/core/IWebView;Ljava/lang/String;)V
goto :goto_0
.end method
#####
I would attach an .apk of dolphin cleansed of it's spyware AIDS, however I'm not sure if the mods would like that.
update:
Modified APKs posted http://forum.xda-developers.com/showpost.php?p=18799432&postcount=61
update: Fiasco appears on http://www.androidpolice.com/2011/1...e-you-visit-to-a-remote-server-in-plain-text/
update: Dolphin writes blog post claiming data is not retained, and that 'feature' is disabled. Latest market version. (7.0.1/id105) appears, still forwards urls
update: Version 7.0.2 (id 106) no longer forwards urls.
While I have no proof dolphin == mywebzines, they conveniently share the same hosting and dns providers (both domains are registered via proxy)
Code:
[[email protected]]~# for i in $(host -t a dolphin-browser.com|awk '{print $NF}');do host $i;done
89.249.19.50.in-addr.arpa domain name pointer ec2-50-19-249-89.compute-1.amazonaws.com.
[[email protected]]~# for i in $(host -t a en.mywebzines.com|awk '{print $NF}');do host $i;done
77.123.17.50.in-addr.arpa domain name pointer ec2-50-17-123-77.compute-1.amazonaws.com.
185.179.17.50.in-addr.arpa domain name pointer ec2-50-17-179-185.compute-1.amazonaws.com.
58.30.19.50.in-addr.arpa domain name pointer ec2-50-19-30-58.compute-1.amazonaws.com.
167.175.19.50.in-addr.arpa domain name pointer ec2-50-19-175-167.compute-1.amazonaws.com.
93.246.101.75.in-addr.arpa domain name pointer ec2-75-101-246-93.compute-1.amazonaws.com.
53.41.20.107.in-addr.arpa domain name pointer ec2-107-20-41-53.compute-1.amazonaws.com.
205.64.72.184.in-addr.arpa domain name pointer ec2-184-72-64-205.compute-1.amazonaws.com.
119.178.72.184.in-addr.arpa domain name pointer ec2-184-72-178-119.compute-1.amazonaws.com.
156.2.73.184.in-addr.arpa domain name pointer ec2-184-73-2-156.compute-1.amazonaws.com.
33.95.17.50.in-addr.arpa domain name pointer ec2-50-17-95-33.compute-1.amazonaws.com.
[[email protected]]~# host -t ns mywebzines.com;host -t ns dolphin-browser.com
mywebzines.com name server ns2.dnsv5.com.
mywebzines.com name server ns1.dnsv5.com.
dolphin-browser.com name server ns1.dnsv4.com.
dolphin-browser.com name server ns2.dnsv4.com.
[[email protected]]~#
Subscribed.
As a Dolphin user, I'm interested to see where this goes.
Maybe you can get the adfree android developer to add en.mywebzines.com to the next hosts file update and problem solved (for adfree users, at least).
lexluthor said:
Subscribed.
As a Dolphin user, I'm interested to see where this goes.
Maybe you can get the adfree android developer to add en.mywebzines.com to the next hosts file update and problem solved (for adfree users, at least).
Click to expand...
Click to collapse
Does't adfree allow custom entries?
I still use dolphin 4 as it has the best UI on android...especially after the modifications I've made. Unfortunately since it's free of admob and mobosquare code I'd probably get in trouble for posting it
Nice work. I'll keep watching this thread.
Uninstallimg today
mills2533 said:
Nice work. I'll keep watching this thread.
Click to expand...
Click to collapse
Makes you wonder why Google is still allowing Dolphin to stay in their catalog.... Uninstalling today!
Hmmmmph!
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
If we add this address to the hosts file, won't the problem be solved?
Thanks for bringing this up anyways!
Good find, uninstalling now. Do you know if this applies to ant other browsers ?
I use Boat Browser, very clean.. none of the concerns and bloatware mentioned.
is there any word on miren browser?
Uninstalling now, and too bad, I like their setup. Guess I will be shopping around for another browser.
Plus interested in seeing where this will go.
Eh, i don't mind. The only good use that Dolphin gave me was that before i exit it it asked if i wanted to clear history, and so i only use it for porn.
My fav browser is the default MIUI browser.
xriderx66 said:
Eh, i don't mind. The only good use that Dolphin gave me was that before i exit it it asked if i wanted to clear history, and so i only use it for porn.
My fav browser is the default MIUI browser.
Click to expand...
Click to collapse
Heh heh I guess I could use it for soke flixs! Any good sites?
I recommend Boat Browser. It's very smooth and clean. I switched to it from dolphin and I've never looked back.
abdielol said:
I recommend Boat Browser. It's very smooth and clean. I switched to it from dolphin and I've never looked back.
Click to expand...
Click to collapse
Omnichron said:
I use Boat Browser, very clean.. none of the concerns and bloatware mentioned.
Click to expand...
Click to collapse
I remember trying boat. It failed my evaluation on two counts: The lower button bar wouldn't go away, and it constantly posted data to http://www.umeng.com/app_logs
Code:
[P] www.umeng.com:80/app_logs
post: T 10.23.1.220:38582 -> 211.151.139.246:80 [AP] H!}![K!1!!!!!'!!!K!7!A!!E!E|!Y!d!.M!!!H-!!N!!!!}!!!!sfV{!!!!!d!!!!!!#!I!v V-!!!(k!!T!k!!!!!2!j!!"G!A!!!5!A>!!!]!!`K!Tk!!!!`!!!!J^!XdT!jC!!!!!D!!&5C!!:W=!!S!!e D!!!!!g!G!!!!!!O!c!<!!!!!I!1!!!X!!!z!!!!!!1!!4#!!!!!!!!!0>!!!C{4%!:o!~!!!!!!tJ!!!!!!]!!!!!!!!!!!!!!!!!!!C!C!!!!!qY!!5[#!M!!K(+*s!!!PI!u!!/J!!q!0!!!-!!!=?!g!!!Q\!!w!!!R!!!!!0!G3-V2!!U!m!5!q![!j!g!!Z9w!!eV!oC!!od!!!
I've not sifted through smali code to see -what- gets posted, but it does so every time you do something.
Damn it. All the other browsers suck.
Sent from my ADR6300 using Tapatalk
try opera I guess its your only choice
Dolphin mini doesn't have webzine right?
Stock ftw.
can you check miren browser?
Hi guys,
I have some sort of issue, tested on different roms (lollipop based) and it persists (maybe a LP issue?)
Everytime I connect, the DHCP (server 2008) gives me a new IP because the unique ID changes everytime and doesn't just put the MAC address like it should. Here is a screenshot
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
As you can see, the two last entries, i just turned on, off and back on, it got a new IP
Now I know I didn't have that issue before, and after a while, the DHCP gets full. The UID format is also very strange and I just wonder why it doesn't get the MAC address. Anyone seen this issue?
Edit: tested on a KK based rom and it works as intended
QuarkZ26 said:
Hi guys,
I have some sort of issue, tested on different roms (lollipop based) and it persists (maybe a LP issue?)
Everytime I connect, the DHCP (server 2008) gives me a new IP because the unique ID changes everytime and doesn't just put the MAC address like it should. Here is a screenshot
As you can see, the two last entries, i just turned on, off and back on, it got a new IP
Now I know I didn't have that issue before, and after a while, the DHCP gets full. The UID format is also very strange and I just wonder why it doesn't get the MAC address. Anyone seen this issue?
Edit: tested on a KK based rom and it works as intended
Click to expand...
Click to collapse
I can confirm the issue exists on my CyanogenMod 12.1-20150418-NIGHTLY-bacon. Here's the content of dhcp.leases file on my router:
Code:
[email protected]:~# cat /tmp/dhcp.leases
1429667040 c0:ee:fb:26:f2:7f 192.168.1.111 oneplusone ff:00:00:00:22:00:00:01:00:00:06:7e:e0:17:3c:72:53:00:00
1429661505 c0:ee:fb:26:f2:7f 192.168.1.112 * ff:00:00:00:1c:00:00:01:00:00:06:7e:e0:17:3c:72:53:00:00
1429636116 00:16:44:7c:78:a0 192.168.1.116 laptop 01:00:16:44:7c:78:a0
DHCP and Wrong MAC ADDRESS
I have the same problem with CM12S on my one plus one. Before with CM11s everything was ok.
I have the problem when i go to my office where there is a Windows 2008 R2 servers with the DHCP server... i try to make a test at home with my DLINK router that also have a DHCP server but the behavior is different. In the DLINK router if i check the DHCP table i see the right MAC Address of my phone and if i configure the dhcp server to assign a specific ip based on the MAC address of the phone, it works and the ip assigned to the device is what i have set.
Whereas at work i didn't receive the ip choosen because the smartphone seems to send to the DHCP server a wrong MAC Address ID like this 000006f0000001c00000000a01... ecc ecc. that also change every time i disconnect and reconnect the wifi of the smartphone.
Vittorio71 said:
Whereas at work i didn't receive the ip choosen because the smartphone seems to send to the DHCP server a wrong MAC Address ID like this 000006f0000001c00000000a01... ecc ecc. that also change every time i disconnect and reconnect the wifi of the smartphone.
Click to expand...
Click to collapse
Not a wrong MAC address, but a "client identifier" alongside MAC address.
As per RFC 2131:
A DHCP server needs to use some unique identifier to associate a client with its lease. The client MAY choose to explicitly provide the identifier through the 'client identifier' option. If the client supplies a 'client identifier', the client MUST use the same 'client identifier' in all subsequent messages, and the server MUST use that identifier to identify the client. If the client does not provide a 'client identifier' option, the server MUST use the contents of the 'chaddr' field to identify the client.
chaddr is Client Hardware Address, that is, MAC address. DHCP server looks at the client identifier first, then, if absent, at the MAC address. Our phones send different client identifiers each time they request IP from the server resulting in different lease every time.
JIRA report: https://jira.cyanogenmod.org/browse/BACON-3269
CM forum topic: https://forum.cyanogenmod.org/topic/105174-wifi-issue-on-cm12-nightly/
ok thanks for the explanation... i follow the link you provide and i substitute the dhcp client on my smartphone... Tomorrow when i will go to office i will try to connect again and i will verify the behavior of the Windows 2008 r2 dhcp server...
byeee
Vittorio71 said:
ok thanks for the explanation... i follow the link you provide and i substitute the dhcp client on my smartphone... Tomorrow when i will go to office i will try to connect again and i will verify the behavior of the Windows 2008 r2 dhcp server...
byeee
Click to expand...
Click to collapse
Use the one from JIRA. Be sure to backup.
thedamager said:
Use the one from JIRA. Be sure to backup.
Click to expand...
Click to collapse
Yeaaaa...goood!!!
with the dhcp client downloded from JIRA link you provide me everithing works good... also in office, the Windows 2008 r2 DHCP server, receive correctly the MAC address of the smartphone and assign me the right IP address as happened before, with the previous firmware release (CM11S)
Thanks a lot!! Bye
Hello,
Before android 4.2, it was very easy to change the mac address on a rooted device. After 4.2, I found it very difficult to do so and also subsequently connect to a WPA secured network, receiving the error "WPA: 4-way handshake failed" in logcat. Pry-fi worked for a while, but stopped working on updating to lollipop and is no longer maintained. I also desired the ability to spoof my mac address when connecting to a network without having to swap out saved networks everytime the wifi turned on.
I figured out that the kernel accepts the new mac address into the networking drivers but wpa_supplicant stores the mac address in memory and is not updated when I issue the appropriate busybox command. Killing wpa_supplicant made wifi unusable until it was turned off and on again, which of course resets the kernel-based mac address. The solution I found was to turn wifi off completely, apply the mac address and turn wifi on again (svc wifi disable being more dramatic than a simple ifconfig wlan0 down). Some devices bring the entire network interface down when this happens however, so I also include a bit of code to inject the mac address just before wpa_supplicant starts up.
This app also lets you set a mac address to something of your choosing. It also supports being called through intents, allowing tasker/other app integration. It is also open-source, unlike most of the other apps I have seen recommended. It also reapplies the mac address every time wifi turns on (or randomises it every time wifi is switched off and on again if the option is set).
Screenshots:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Downloads:
Code:
https://github.com/moosd/NetworkGhost/releases/
Source code:
Code:
https://github.com/moosd/NetworkGhost
I have tested this on a Samsung Galaxy S4 running CyanogenMod 12.1. and a HTC One M7 and M9 Let me know if it works for you. It probably won't work on a lot of phones that lie about changing the mac address - please do confirm your mac address has changed manually (e.g. from your router admin panel or even from adb shell ip addr) to make sure it works!
So I hate to sound like an idiot, but in lamens, this allows me to be "random" on a WiFi connection?
ericc191 said:
So I hate to sound like an idiot, but in lamens, this allows me to be "random" on a WiFi connection?
Click to expand...
Click to collapse
If you set both the mac address and the hostname to random (by toggling the buttons that say "User-set"), every time you turn wifi off and on again you should appear as a new entity to a wifi network. (For example, hypothetically if the wifi network happens to limit free internet usage to say 15 minutes, you will obtain a further 15 minutes by hitting update or by re-enabling wifi from your settings)
However, your anonymity may still be affected by the internet traffic your device is sending - think of this as a first step
Thank you for explaining that! downloading
Just getting a force close with my S3, which runs Cyanogenmod 12.1 (Android 5.1)
Already pulled the apk?
Sent from my SM-G925T using XDA Forums Pro.
Draygon said:
Just getting a force close with my S3, which runs Cyanogenmod 12.1 (Android 5.1)
Click to expand...
Click to collapse
If you post the logcat output when this happens then I can try to investigate this for you
Critical Detox said:
Already pulled the apk?
Sent from my SM-G925T using XDA Forums Pro.
Click to expand...
Click to collapse
Nope, I have just updated the apk to do MAC Spoofing in a different way that should work on more devices. Let me know if it works!
Unfortunately it only force closes on my 5.1 phone. I get a random MAC every time. It would be great to spoof it, to get a 'fixed' MAC address.
Didn't work on my Moto E 2015 (XT1526) Anyways I attached the log file, hope it helps
Hi,
I am successfully using ADB Wifi with my Android 11 device.
But each time you connect to the device using adb from the PC, you have to check the port number first at it is randomly defined by Android ! (the IP is fix as I have fixed it on my home network)
It you could specify the port address and have it fix, you could connect to your Android without having to grap the phone, go though the 'Developer options' menu to look at this port number.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Set IP address to Static and you're fine.
jwoegerbauer said:
Set IP address to Static and you're fine.
Click to expand...
Click to collapse
I am using static IP address. The problem is with the port. It needs to be a static port.
ADB by default makes use of port 5555: of course you have to verify that port isn't blocked by switch or firewall. You alternately can use port 3389.
jwoegerbauer said:
ADB by default makes use of port 5555: of course you have to verify that port isn't blocked by switch or firewall. You alternately can use port 3389.
Click to expand...
Click to collapse
On the screenshot above the port given is 33515, can I specify I want to use another port like 5555 ?
I have Android 11, I have the impression it is only possible to use 5555 in Android 10.
On Android - where it doesn't matter what version - ports 5555 and/or 3389 are reserved for ADB. Point.
jwoegerbauer said:
On Android - where it doesn't matter what version - ports 5555 and/or 3389 are reserved for ADB. Point.
Click to expand...
Click to collapse
I have tried ports 5555 and 3889, they do not work:
But it worked with the port 40001 given by my phone wireless debug screen. This number is not static unfortunately.
No worries, jwoegerbauer doesn't know what they're talking about in this case or maybe don't understand the question fully.
You either connect to the phone via adb an issue the command
Code:
adb tcpip <port number>
to set the port to be fixed UNTIL the next reboot!
Or maybe you can localy execute the shell commands
Code:
setprop service.adb.tcp.port <port number>
stop adbd
start adbd
for which you might need root, I'm not sure. Also works only until the next reboot, AFAIK.
To set the port fixed even after a reboot you'd have to get more crafty. Maybe some kind of startup script that does it for you. And there are also "Wifi Debugging" apps in the app store (careful!) that may set the port for you.
All the best,
KurrKurr
I feel sorry for the OP, as much as I feel sorry for myself... as I have the same problem, and so does EVERYONE using the new Android 11 and Android 12 Developer options Wireless debugging features!
I found this thread trying to find someone (anyone!) who understands that adb, as of Android 11 has the ability to connect COMPLETELY wirelessly (i.e., no need for 5555 over USB!)
Android 12 even has the ability to add a new tile that makes it tremendously easier to connect COMPLETELY WIRELESSLY between adb on the PC and the Android phone.
(PSA) Using the new Android 12 TILE for 'Developer options' 'Wireless debugging' to establish adb connection over Wi-Fi without USB
The problem with most answers to this thread is people dont' seem to understand this is new with Android 11 and Android 12. The people who responded seem to think you first connect over USB with TCP port 5555 and then disconnect to use adb over Wi-Fi (which worked for years and still does but that's not the problem here).
The problem?
The problem is Android 11 and Android 12 use a RANDOM port between some range that seems to be within 3#### and 4#### but what we NEED is a command to FIND that port without LOOKING at the Android device to get that port.
[adb,scrcpy,vysor] What ports does Android 12 randomly set when Wi-Fi connecting via Wireless debugging adb "pair" or "connect" commands?
That is the solution everyone needs (me included)!
The problem:
You can toggle wireless debugging on the quick tile, but you can't access the random port without knowing it.
Solution:
After using the quick tile to enable wireless debugging, you can use nmap (and awk) on your debug workstation to discover the open port to run "adb connect <IP>:<PORT>" with:
1) set Android 11/12/etc. to static IP. If you use DHCP ... you'll have to also discover the DHCP IP of your device. A static DHCP lease will also suffice to make things easy on you if you must rely on DHCP for the particular network you're accessing. In any event, you must be able to know or discover the IP address of your device in order to make this work.
2) turn on wireless debugging - you'll note that it changes the port every time wireless debugging is toggled on.
3) The ports are supposedly always within the range of 30000 to 49999.
4) since we have the IP and the port range, we can use nmap to obtain the listening port. So this step is to install nmap and awk if you dont have those commands (run "nmap" and "awk" on their own to see if you have them in your path)
5) run this code - set PHONE= to the static IP of your device. Mine is set to 192.168.19.19, so:
PHONE=192.168.19.19
adb connect ${PHONE}:$( nmap -sT ${PHONE} -p30000-49999 | awk -F/ '/tcp open/{print $1}' )
6) it should connect with something like this message:
connected to 192.168.19.19:42699
this is not a perfect solution if you happen to have other apps that open a listening TCP port in those ranges... but you could also filter those specific ports out with the nmap range. Most people won't be in this boat, but its probably worth mentioning for someones sake.
For Windows it looks like this. Feel free to suggest improvements.
I use gawk 3.1.6 & Nmap 7.92
Wireless_ADB_RecoverPhone.cmd
@nmap -p 30000-49999 -sS -T5 -A 192.168.178.21 | awk -F/ "/tcp open/{print $1}"
Click to expand...
Click to collapse
Wireless_ADB_Connect.cmd
@echo off
:MAIN
adb start-server
if defined PHONE_PORT goto :END
:CONNECT
echo Port scanning and connecting...
for /F %%I IN ('Wireless_ADB_RecoverPhone.cmd') DO @set PHONE_PORT=%%I
adb connect 192.168.178.21:%PHONE_PORT%
echo.
:END
adb devices
echo.
echo Connected!
Click to expand...
Click to collapse