Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to install xposed on Google Pixel XL Mobile phone to create Mobile Security testing tool

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

This article mainly introduces how Google Pixel XL phones install xposed to create mobile security testing tools, the article introduces in great detail, has a certain reference value, interested friends must read it!

What are 0x01 and xposed?

Xposed is a framework with many modules, all of which rely on the framework xposed. Xposed is called the first artifact because these modules can perform many incredible functions, such as modifying the interface of Wechat, automatically grabbing red packet modules, customizing the text of the program, preventing Wechat messages from being withdrawn, and preventing the whole bucket of the three hooligans of BAT from waking up each other and starting the chain. Automatically kill the APP after locking the screen to prevent power consumption in the background, and there are many B modules that modify App or mobile phone data, and so on.

The principle of xposed is to modify the key files of the system, and then when APP calls system API, it first goes through xposed, and these xposed-based modules can selectively do some "bad" things when App calls these api, or modify the returned results, so that the effect of app will change at run time, but the app itself is not destroyed, only when the system api is called, the performance of the Android system changes. This is the hook, the technical term hook. So, to put it bluntly, xposed is a powerful hook framework.

0x02, unlock Bootloader

First, configure ADB and fastboot

1. First of all, you need to back up the data on your phone. It is the same for Pixel or Nexus to unlock the BL. After unlocking, all the data on the phone will be erased.

two。 The settings of the mobile phone-- about the mobile phone-- press this version number 5 in a row to open the developer option.

3. Phone settings-developer options, start USB debugging, and unlock the OEM lock.

4. Download the platform-tools file, will set the environment variable, set it yourself, if not, then CD to the appropriate directory.

Platform-tools.rar Toolkit https://pan.baidu.com/s/1pLGK2KF

To enter the bootloader, you can enter by pressing and holding down the power button + volume reduction button in the shutdown state, or by using the ADB command.

Adb reboot bootloader

Verify whether fastboot is successful or not.

Fastboot devices

If the prompt is the same as the following figure, then the basic work is done.

Enter bl Boot

Adb reboot bootloader

Unlock Bootloader

Fastboot flashing unlock

It can usually be done very quickly.

Fastboot reboot

Restart the phone

After the phone is rebooted, the Pixel XL cable can be unplugged, and the Bootloader of USB is unlocked.

0x03, line brush official system

First download the factory image and SDK Platform Tools.

# Factory Image https://developers.google.cn/android/images#marlin#SDK Platform Tools https://developer.android.google.cn/studio/releases/platform-tools

After downloading the above two files, extract them, and then merge the extracted things into a folder, as shown below.

After that, the phone uses the shutdown key + the volume key minus sign to enter the Bootloader when the phone is turned off. Of course, you can also enter it through the following command.

# Boot into Bootloaderadb reboot bootloader

Please exit your Google account and delete the unlock password before swiping the machine. Then double-click the flash-all.bat in the folder to start restoring the factory image of the brush machine. Wait patiently for a while to restore the mirroring, which is actually quite fast. Finish brushing the machine

In order to successfully enter the system, do not install the software, directly root, lest root failure and restore the factory image.

0x04 and Pixel XL are brushed into Twrp and Root

Since both Pixel and Pixel XL use the Aamp B upgrade system, it can be understood that there are two systems in the phone, so if you enter it in the traditional way of brushing into Twrp, you won't get a permanent Twrp. So you need to brush in a temporary Twrp first, and then brush in the permanent Twrp through the temporary Twrp to get Root permissions.

1. Download temporary Twrp, permanent Twrp and Magisk first.

Temporary Twrp:twrp-3.1.1-1-fastboot-marlin.img

Https://dl.twrp.me/marlin/twrp-3.1.1-1-fastboot-marlin.img

Https://dl.twrp.me/marlin/

Permanent Twrp:twrp-pixel-installer-marlin-3.1.1-1.zip

Https://dl.twrp.me/marlin/twrp-pixel-installer-marlin-3.1.1-1.zip

Magisk Beta V15.4

Https://forum.xda-developers.com/apps/magisk/beta-magisk-v13-0-0980cb6-t3618589

two。 Copy twrp-3.1.1-1-fastboot-marlin.img into the platform-tools directory, copy twrp-pixel-installer-marlin-3.1.1-1.zip and downloaded Magisk to the phone, connect to the phone, open CMD, and remember to use cd to change to the platform-tools directory. Enter adb.

# Boot into Bootloader

Adb reboot bootloader

# swiping into temporary Twrp

Fastboot boot twrp-3.1.1-1-fastboot-marlin.img

3. After that, the phone will enter the temporary Twrp, select Install and enter twrp-pixel-installer-marlin-3.1.1-1.zip and Magisk in turn.

After brushing in, do not check Twrp APP, and then restart the phone to enter the system. There is a Magisk Facebook Logo in the APP of the phone. Download a black domain and other software to have a try. Root should be successful.

0x05, swipe into Xposed

As the use of the EdXposed framework needs to be based on the Magisk framework, the phone needs to be brushed into Magisk and Root. As for how to swipe Magisk and Root into Android9.0 devices, you can follow the "Android9.0 Root tutorial Pixel XL". As the EdXposed framework needs to be based on Magisk V17.0 or above, as for the Magisk framework to be brushed in, please use the version provided below.

Magisk GitHub download address

Https://github.com/topjohnwu/Magisk/releases downloads Magisk's latest official zip and apk files

Riru-Core GitHub download address

Https://github.com/RikkaApps/Riru/releases downloads Magisk version of riru-core brushing machine zip

EdXposed GitHub download address

Https://github.com/ElderDrivers/EdXposed/releases downloads the Magisk version of zip and the latest version of EdXposedInstaller Apk. Download the above content

Magisk-v18.1.zip

Magisk-riru-core-v15.zip

Magisk-EdXposed-v0.2.9.9_beta1-release.zip

EdXposedInstaller_v2.2.0-release.apk

After you are ready, first copy the things needed to brush the machine into your hands, enter Magisk and enter magisk-riru-core-v15.zip first, restart the phone, and then enter Magisk and magisk-EdXposed-v0.2.9.9_beta1-release.zip again.

Go to Magisk to check whether the above modules are successfully typed, and check it and restart to activate it. Then install EdXposedInstaller_v2.2.0-release.apk.

If you open EdXposed Installer, if you see a green check, it means that EdXposed's brushing is successful!

Note: in addition to the risk of brushing the machine, you must back up the data before brushing the machine. It is important to keep in mind that EdXposed is a little different from the official original Xposed, at least somewhat flawed, but for Xposed author Rovo89, this is a very mature alternative to Xposed. As an alternative to Xposed, there should be some shortcomings, although it can support most modules, but for the system-related complex modules, the degree of compatibility is poor, such as does not support the status bar class beautification class framework.

Optimize

Remove the wifi cross mark in the domestic network environment, after networking through wifi, the wifi icon of Pixel will display a "cross" by default. Although it can connect to the Internet normally, it is still a nuisance to the obsessive-compulsive disorder.

The rationale explanation for this problem is:

When Google's native Android connects to a mobile data network or WIFI network, its NetworkMonitor module initiates a http request to a specific server and uses the response received to determine the status of the network. Because Google's server is blocked by GFW, so there is no return value, Google Android will put an exclamation point or cross on the signal or wifi.

It can be solved by replacing it with v2ex verification. Execute from a command prompt:

Adb shell settings put global captive_portal_https_url https://www.google.cn/generate_204 then turn on the flight mode, and then turn off the flight mode.

The above is all the contents of the article "how to install xposed to create a mobile security detection tool for Google Pixel XL phones". Thank you for reading! Hope to share the content to help you, more related knowledge, welcome to follow the industry information channel!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report