Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 283 Vote(s) - 3.59 Average
  • 1
  • 2
  • 3
  • 4
  • 5
OG KILLA J3 PRIME T1 ROOT METRO PCS VARIANT

#1

[To see links please register here]


WE HAVE BYPASSED KNOX GENTLEMEN WELCOME TO FIGHT CLUB


RULES
1. WE DO NOT TALK ABOUT FIGHT CLUB
Reply

#2
Coincidentally, I was discussing rooting the Samsung Galaxy J1 yesterday In

[To see links please register here]

.

I'm curious whether this can be manipulated to accommodate It.
Reply

#3
After reading the XDA post, and getting an unsolicited PM from OP, I don't really understand why this deserves any recognition at all.

Basically the obstacle here is that Samsung included a single security feature on the device (as opposed to the many dozens that non-android devices usually include), and therefore the average 11 year old couldn't just make a zip file and "root" it. This single security feature came in the form of an on-cpu EPROM, the same feature used on a raspi or an iphone. When the device powers on, the entire contents of this ROM is moved to memory and then jumped to. After this, the code then loads the "bootloader" image, runs a signature check on it, and if the signature matches Samsung's signature, it runs the code, which eventually boots the device.

The "method" the "devs" used to bypass this security actually didn't bypass it at all, it just exploited the serious uselessness of Samsung and their affiliates. All they did was run a few Google searches for the engineering (usually for factory tests) firmware, which I managed to find a copy of (dated long before the XDA post was written) in about 70 seconds. After that, they just took advantage of factory used binaries that were present in the non-production firmware to modify the filesystem (which was still unsecured).

This is actually pretty similar to what was going on in the iPhone jailbreak scene circa 2008. Many times back then, things were overlooked or just outright left in because the engineers didn't see them as a risk. One of the earliest examples (2006/7) was the CP command being left in the restore mode firmware, allowing you to push custom files to the device, ultimately allowing you to modify the USB access permissions. (

[To see links please register here]

)

After that, things got more difficult. To date, the pre-kernel chain of trust has only been broken 5 times in the course of 12 years. It's nice to see that Samsung is actually starting to put security features on their devices, but they're still 10 years behind.
Reply

#4
Is it like a partition or something???

Quote:(08-08-2018, 02:43 PM)phyrrus9 Wrote:

[To see links please register here]

After reading the XDA post, and getting an unsolicited PM from OP, I don't really understand why this deserves any recognition at all.

Basically the obstacle here is that Samsung included a single security feature on the device (as opposed to the many dozens that non-android devices usually include), and therefore the average 11 year old couldn't just make a zip file and "root" it. This single security feature came in the form of an on-cpu EPROM, the same feature used on a raspi or an iphone. When the device powers on, the entire contents of this ROM is moved to memory and then jumped to. After this, the code then loads the "bootloader" image, runs a signature check on it, and if the signature matches Samsung's signature, it runs the code, which eventually boots the device.

The "method" the "devs" used to bypass this security actually didn't bypass it at all, it just exploited the serious uselessness of Samsung and their affiliates. All they did was run a few Google searches for the engineering (usually for factory tests) firmware, which I managed to find a copy of (dated long before the XDA post was written) in about 70 seconds. After that, they just took advantage of factory used binaries that were present in the non-production firmware to modify the filesystem (which was still unsecured).

This is actually pretty similar to what was going on in the iPhone jailbreak scene circa 2008. Many times back then, things were overlooked or just outright left in because the engineers didn't see them as a risk. One of the earliest examples (2006/7) was the CP command being left in the restore mode firmware, allowing you to push custom files to the device, ultimately allowing you to modify the USB access permissions. (

[To see links please register here]

)

After that, things got more difficult. To date, the pre-kernel chain of trust has only been broken 5 times in the course of 12 years. It's nice to see that Samsung is actually starting to put security features on their devices, but they're still 10 years behind.
Reply

#5
Yeah, as with phyrrus, its not a huge deal. I know a few people have managed to do this already its just a matter of being able to get in and mess with the filesystem that isn't all locked down as it should be.

It's useful for those with these devices, but overall it isn't a massive thing to have occur.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through