Re: [android-security-discuss] Native Exploit

2011-08-03 Thread patrick Immling
Thanks a lot for all your responses. And btw is it so that all services/activities within the system partition only have a temporary privilege escalation to root? Or is there anything on the system partition like some daemons all the time running as root? And if not, is this done as a conscious

Re: [android-security-discuss] Native Exploit

2011-08-03 Thread patrick Immling
Ok 'mount' via terminal gives permission denied. seems good On Wed, Aug 3, 2011 at 9:01 AM, patrick Immling pimml...@googlemail.comwrote: Thanks a lot for all your responses. And btw is it so that all services/activities within the system partition only have a temporary privilege escalation

[android-security-discuss] Spoofing System Services of Android

2011-08-03 Thread Narendran
Hello, I'm developing an app which is passing some confidential info to a few services (WifiManager and AccountManager to be precise) in plaintext form. Can someone please let me know how easy or difficult it is for hacking the Context of an app and spoof these services? I'm essentially looking at

Re: [android-security-discuss] Native Exploit

2011-08-03 Thread Disconnect
FYI the last time I elevated access to a device I did it with a simple command-line app - no apk wrapper. (Saved it to a writable directory on /data and ran it from adb shell.) There isn't anything inherently more secure about the lower level interfaces to prevent someone from writing an exploit

Re: [android-security-discuss] Native Exploit

2011-08-03 Thread Chris Stratton
On Wednesday, August 3, 2011 4:01:39 AM UTC-4, patrick Immling wrote: @Chris: So the ONLY way exploits gets into the Android is by means of Apps. No, not at all. Most are initially done using adb. A few have been done via web pages and the like. Or to elaborate, even native exploits are

Re: [android-security-discuss] Native Exploit

2011-08-03 Thread Chris Stratton
On Wednesday, August 3, 2011 4:13:21 AM UTC-4, patrick Immling wrote: Ok 'mount' via terminal gives permission denied. seems good In this case, probably yes. But permission denied is one of the few error messages some versions of the android toolbox package knows, and it uses it for almost