Thank you for your quick reply.

I checked more detail about kingroot.

It using chcon using in their toolbox.

postroot.sh
kr_set_perm() {
#if [ -f "$5" -o -d "$5" ]; then
$MY_TOOLBOX chown $1.$2 $5
if [ -f "/system/bin/chcon" ]; then
$MY_TOOLBOX chcon $3 $5
fi
$MY_TOOLBOX chmod $4 $5
#fi
}

kr_set_perm 0 0 u:object_r:system_data_file:s0 00755 /data/data-lib

kr_set_perm 0 0 u:object_r:system_data_file:s0 00755 /data/data-lib/king

kr_set_perm 0 0 u:object_r:system_data_file:s0 00755
/data/data-lib/com.kingroot.RushRoot

kr_set_perm 0 0 u:object_r:system_file:s0 00755 /system/xbin/krdem

kr_set_perm 0 0 u:object_r:system_file:s0 00755 $1/xbin/supolicy


so, their apk file and other daemon will change system_file,

*Why chcon needed in toolbox?*

It is very vulnerable to hackers..

even that it could change init domain..

Kingroot apk also chaned to init domain during rooting process..


*Is it possible disable chcon in toolbox? *

Thanks.

2015-11-27 23:05 GMT+09:00 William Roberts <bill.c.robe...@gmail.com>:

> From what I can tell, kingroot bundles up exploits on a server and then
> figures out what one will work on your device and tries it.
>
> I would start by patching and fixing all known vulnerabilities for a given
> system.
>
> From there, you state it does a setenforce 0. IIRC only init has this
> capability, so somehow its already gotten its process context to init. You
> could remove this permission and pass enforcing mode via kernel cmdline,
> but that's not going to help you here. If it was able to change process
> context to init, its likely doing kernel exploits and poking at kernel data
> structures. A good example of an exploit that does this would be towel
> root. In a nutshell, any exploit that provides the ability to tamper with
> kernel memory, especially strict cred and the auxillary void * for lsms,
> all bets are off for selinux.
>
> You could start to see if a change to policy would prevent the proper
> execution of a given exploit. However something like towel root used a
> futex vulnerability, their is no selinux controls on futex usage, so its
> very exploit dependent.
>
> You could, as an additional safeguard, use some type of higher privilege
> mode of execution (think trustzone or hypervisor) to protect various kernel
> pages like the cred and selinux structures in memory, so even the kernel
> has to trap to you to write these pages. The techniques to do this are
> highly architecture specific.
> On Nov 27, 2015 5:42 AM, "심현용" <jonesn5...@gmail.com> wrote:
>
>> Dear all.
>>
>> Thank you for your always kindly explain.
>> I have some question about rooting app 'kingroot'
>>
>> You can install apk bellow site.
>>  http://www.kingroot.net/
>>
>> It can root device though supolicy.
>> I think It use to policy-inject, It will change setenforce 0 (permissive
>> mode)
>> and will change permissive per domain like init, init_shell, toolbox,
>> etc...
>>
>> How can I prevent this apk's tool.
>> Is it any method to fix?
>>
>> Please help me..
>>
>> Thanks.
>>
>>
>> _______________________________________________
>> Seandroid-list mailing list
>> Seandroid-list@tycho.nsa.gov
>> To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
>> To get help, send an email containing "help" to
>> seandroid-list-requ...@tycho.nsa.gov.
>>
>
_______________________________________________
Seandroid-list mailing list
Seandroid-list@tycho.nsa.gov
To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
To get help, send an email containing "help" to 
seandroid-list-requ...@tycho.nsa.gov.

Reply via email to