Could explain that in more detail please? (and also why it is a bad
idea)

On Sep 4, 7:23 pm, Chris Stratton <[email protected]> wrote:
> You need to create a privilege escalation mechanism then.  Try adding
> whatever is used on the rooted rom you want to be compatible with.
>
> A bad idea (but hey, its an emulator) is to use adb shell to make a
> copy of sh owned by root, with the setuid bit set, called something
> else.  Run that and then run your special commamds from within it.
>
> On Sep 4, 9:51 am, Earlence <[email protected]> wrote:
>
> > Yes. via adb shell everything works. my point is to execute privileged
> > commands from within the terminal emulator or from within native/Java
> > code on the emulator to simulate a rooted device.
>
> > Cheers,
> > Earlence
>
> > On Sep 4, 10:40 am, Chris Palmer <[email protected]> wrote:
>
> > > > Then using the terminal emulator,
>
> > > Are you using the terminal emulator app on the emulator itself? That
> > > is wrong. Use the adb command from your Android development
> > > desktop/laptop.

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to