Coder Social home page Coder Social logo

akhilkedia / knoxmessengerexploitpoc Goto Github PK

View Code? Open in Web Editor NEW
13.0 7.0 8.0 173 KB

This is a proof of concept exploit which bypasses root detection in Samsung's Knox Messenger. This has been reported to Knox Messenger team.

License: Other

Java 100.00%
samsung knox exploit xposed

knoxmessengerexploitpoc's People

Contributors

akhilkedia avatar gouravsamsung avatar witoldo7 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar

knoxmessengerexploitpoc's Issues

Issue with knox messenger root bypass 1.6

I have problem with knox messenger root bypass version 1.6 and 1.5 (both versions are not working for me) Only 1.0 version works fine (initialize properly) but it doesn't work with newest knox messenger app. Version 1.6 module fails to initialize with following error (logs from xposed installer):

08-04 12:49:35.200 I/Xposed ( 3303): Starting Xposed version 88.0 (Systemless by topjohnwu), compiled for SDK 24
08-04 12:49:35.200 I/Xposed ( 3303): Device: SM-G930F (samsung), Android version 7.0 (SDK 24)
08-04 12:49:35.200 I/Xposed ( 3303): ROM: NRD90M.G930FXXU1DQIC
08-04 12:49:35.200 I/Xposed ( 3303): Build fingerprint: samsung/heroltexx/herolte:7.0/NRD90M/G930FXXU1DQIC:user/release-keys
08-04 12:49:35.200 I/Xposed ( 3303): Platform: arm64-v8a, 32-bit binary, system server: no
08-04 12:49:35.200 I/Xposed ( 3303): SELinux enabled: yes, enforcing: no
08-04 12:49:38.950 I/Xposed ( 3303): -----------------
08-04 12:49:38.950 I/Xposed ( 3303): Added Xposed (/system/framework/XposedBridge.jar) to CLASSPATH
08-04 12:49:39.276 I/Xposed ( 3303): Detected ART runtime
08-04 12:49:39.279 I/Xposed ( 3303): Found Xposed class 'de/robv/android/xposed/XposedBridge', now initializing
08-04 12:49:39.454 I/Xposed ( 3303): Loading modules from /data/app/dev.ukanth.ufirewall-1/base.apk
08-04 12:49:39.470 I/Xposed ( 3303): Loading class dev.ukanth.ufirewall.xposed.XposedInit
08-04 12:49:39.486 I/Xposed ( 3303): Loading modules from /data/app/akhil.knoxrootbypass-2/base.apk
08-04 12:49:39.552 I/Xposed ( 3303): Loading class akhil.knoxrootbypass.knoxRootBypass
08-04 12:50:43.924 I/Xposed (11283): Knox Bypass Root: com.sds.mysinglesquare
08-04 12:50:43.927 E/Xposed (11283): de.robv.android.xposed.XposedHelpers$ClassNotFoundError: java.lang.ClassNotFoundException: byo
08-04 12:50:43.927 E/Xposed (11283): at de.robv.android.xposed.XposedHelpers.findClass(XposedHelpers.java:69)
08-04 12:50:43.927 E/Xposed (11283): at akhil.knoxrootbypass.knoxRootBypass.handleLoadPackage(knoxRootBypass.java:21)
08-04 12:50:43.927 E/Xposed (11283): at de.robv.android.xposed.IXposedHookLoadPackage$Wrapper.handleLoadPackage(IXposedHookLoadPackage.java:34)
08-04 12:50:43.927 E/Xposed (11283): at de.robv.android.xposed.callbacks.XC_LoadPackage.call(XC_LoadPackage.java:61)
08-04 12:50:43.927 E/Xposed (11283): at de.robv.android.xposed.callbacks.XCallback.callAll(XCallback.java:106)
08-04 12:50:43.927 E/Xposed (11283): at de.robv.android.xposed.XposedInit$2.beforeHookedMethod(XposedInit.java:123)
08-04 12:50:43.927 E/Xposed (11283): at de.robv.android.xposed.XposedBridge.handleHookedMethod(XposedBridge.java:317)
08-04 12:50:43.927 E/Xposed (11283): at android.app.ActivityThread.handleBindApplication()
08-04 12:50:43.927 E/Xposed (11283): at android.app.ActivityThread.-wrap3(ActivityThread.java)
08-04 12:50:43.927 E/Xposed (11283): at android.app.ActivityThread$H.handleMessage(ActivityThread.java)
08-04 12:50:43.927 E/Xposed (11283): at android.os.Handler.dispatchMessage(Handler.java)
08-04 12:50:43.927 E/Xposed (11283): at android.os.Looper.loop(Looper.java)
08-04 12:50:43.927 E/Xposed (11283): at android.app.ActivityThread.main(ActivityThread.java)
08-04 12:50:43.927 E/Xposed (11283): at java.lang.reflect.Method.invoke(Native Method)
08-04 12:50:43.927 E/Xposed (11283): at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java)
08-04 12:50:43.927 E/Xposed (11283): at com.android.internal.os.ZygoteInit.main(ZygoteInit.java)
08-04 12:50:43.927 E/Xposed (11283): at de.robv.android.xposed.XposedBridge.main(XposedBridge.java:103)
08-04 12:50:43.927 E/Xposed (11283): Caused by: java.lang.ClassNotFoundException: byo
08-04 12:50:43.927 E/Xposed (11283): at java.lang.Class.classForName(Native Method)
08-04 12:50:43.927 E/Xposed (11283): at java.lang.Class.forName(Class.java)
08-04 12:50:43.927 E/Xposed (11283): at external.org.apache.commons.lang3.ClassUtils.getClass(ClassUtils.java:823)
08-04 12:50:43.927 E/Xposed (11283): at de.robv.android.xposed.XposedHelpers.findClass(XposedHelpers.java:67)
08-04 12:50:43.927 E/Xposed (11283): ... 16 more
08-04 12:50:43.927 E/Xposed (11283): Caused by: java.lang.ClassNotFoundException: Didn't find class "byo" on path: DexPathList[[zip file "/data/app/com.sds.mysinglesquare-1/base.apk"],nativeLibraryDirectories=[/data/app/com.sds.mysinglesquare-1/lib/arm, /data/app/com.sds.mysinglesquare-1/base.apk!/lib/armeabi, /system/lib, /vendor/lib]]
08-04 12:50:43.927 E/Xposed (11283): at dalvik.system.BaseDexClassLoader.findClass(BaseDexClassLoader.java:56)
08-04 12:50:43.927 E/Xposed (11283): at java.lang.ClassLoader.loadClass(ClassLoader.java)
08-04 12:50:43.927 E/Xposed (11283): at java.lang.ClassLoader.loadClass(ClassLoader.java)
08-04 12:50:43.927 E/Xposed (11283): ... 20 more

Exploit?

To be honest, this isn't really an exploit.
This is just a simple bypass, as most Xposed Modules use for bypassing root detection...

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.