Android Hidden Root through N-day
rooting through N-day
Android Hidden Root through N-day
When I am doing a sort of PT or even exploring an app, a critical issue that can be time-consuming is root detection bypass, the same technique used around the world by using the Magisk tool and then patching an Android image with a root.
As this is the standard way of gaining root privilege, Apps detect that either manually or using some known library.
I came across securitylab , and I found that they have many Android exploits for patched Vulrnablity (N-days), I tried some of them and it worked, it gave me a a root shell.
that made me want to dig a bit deep by downloading some apps with root detection mitigation like banking apps, also I made an app with a known library to check how things going on. with this technique, you’ll literally have a rooted shell almost impossible to be detected.
Here we’ll take a look at a specific bug which is GHSL-2023-005 but the process should be the same more or less for other bugs.
To start, you should have pixel device, then search in the repo the vulnerable android version, something like this
google/oriole/oriole:13/TQ1A.230105.002/9325679:user/release-keys
then download it from Android factory images, make sure to download the compatible image with your pixel model.
have a copy from securitylab in your machine, compile and push the executable then run it.
here is a video that shows how it works with normal root