In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
This article mainly introduces how Google Pixel XL phones install xposed to create mobile security testing tools, the article introduces in great detail, has a certain reference value, interested friends must read it!
What are 0x01 and xposed?
Xposed is a framework with many modules, all of which rely on the framework xposed. Xposed is called the first artifact because these modules can perform many incredible functions, such as modifying the interface of Wechat, automatically grabbing red packet modules, customizing the text of the program, preventing Wechat messages from being withdrawn, and preventing the whole bucket of the three hooligans of BAT from waking up each other and starting the chain. Automatically kill the APP after locking the screen to prevent power consumption in the background, and there are many B modules that modify App or mobile phone data, and so on.
The principle of xposed is to modify the key files of the system, and then when APP calls system API, it first goes through xposed, and these xposed-based modules can selectively do some "bad" things when App calls these api, or modify the returned results, so that the effect of app will change at run time, but the app itself is not destroyed, only when the system api is called, the performance of the Android system changes. This is the hook, the technical term hook. So, to put it bluntly, xposed is a powerful hook framework.
0x02, unlock Bootloader
First, configure ADB and fastboot
1. First of all, you need to back up the data on your phone. It is the same for Pixel or Nexus to unlock the BL. After unlocking, all the data on the phone will be erased.
two。 The settings of the mobile phone-- about the mobile phone-- press this version number 5 in a row to open the developer option.
3. Phone settings-developer options, start USB debugging, and unlock the OEM lock.
4. Download the platform-tools file, will set the environment variable, set it yourself, if not, then CD to the appropriate directory.
Platform-tools.rar Toolkit https://pan.baidu.com/s/1pLGK2KF
To enter the bootloader, you can enter by pressing and holding down the power button + volume reduction button in the shutdown state, or by using the ADB command.
Adb reboot bootloader
Verify whether fastboot is successful or not.
Fastboot devices
If the prompt is the same as the following figure, then the basic work is done.
Enter bl Boot
Adb reboot bootloader
Unlock Bootloader
Fastboot flashing unlock
It can usually be done very quickly.
Fastboot reboot
Restart the phone
After the phone is rebooted, the Pixel XL cable can be unplugged, and the Bootloader of USB is unlocked.
0x03, line brush official system
First download the factory image and SDK Platform Tools.
# Factory Image https://developers.google.cn/android/images#marlin#SDK Platform Tools https://developer.android.google.cn/studio/releases/platform-tools
After downloading the above two files, extract them, and then merge the extracted things into a folder, as shown below.
After that, the phone uses the shutdown key + the volume key minus sign to enter the Bootloader when the phone is turned off. Of course, you can also enter it through the following command.
# Boot into Bootloaderadb reboot bootloader
Please exit your Google account and delete the unlock password before swiping the machine. Then double-click the flash-all.bat in the folder to start restoring the factory image of the brush machine. Wait patiently for a while to restore the mirroring, which is actually quite fast. Finish brushing the machine
In order to successfully enter the system, do not install the software, directly root, lest root failure and restore the factory image.
0x04 and Pixel XL are brushed into Twrp and Root
Since both Pixel and Pixel XL use the Aamp B upgrade system, it can be understood that there are two systems in the phone, so if you enter it in the traditional way of brushing into Twrp, you won't get a permanent Twrp. So you need to brush in a temporary Twrp first, and then brush in the permanent Twrp through the temporary Twrp to get Root permissions.
1. Download temporary Twrp, permanent Twrp and Magisk first.
Temporary Twrp:twrp-3.1.1-1-fastboot-marlin.img
Https://dl.twrp.me/marlin/twrp-3.1.1-1-fastboot-marlin.img
Https://dl.twrp.me/marlin/
Permanent Twrp:twrp-pixel-installer-marlin-3.1.1-1.zip
Https://dl.twrp.me/marlin/twrp-pixel-installer-marlin-3.1.1-1.zip
Magisk Beta V15.4
Https://forum.xda-developers.com/apps/magisk/beta-magisk-v13-0-0980cb6-t3618589
two。 Copy twrp-3.1.1-1-fastboot-marlin.img into the platform-tools directory, copy twrp-pixel-installer-marlin-3.1.1-1.zip and downloaded Magisk to the phone, connect to the phone, open CMD, and remember to use cd to change to the platform-tools directory. Enter adb.
# Boot into Bootloader
Adb reboot bootloader
# swiping into temporary Twrp
Fastboot boot twrp-3.1.1-1-fastboot-marlin.img
3. After that, the phone will enter the temporary Twrp, select Install and enter twrp-pixel-installer-marlin-3.1.1-1.zip and Magisk in turn.
After brushing in, do not check Twrp APP, and then restart the phone to enter the system. There is a Magisk Facebook Logo in the APP of the phone. Download a black domain and other software to have a try. Root should be successful.
0x05, swipe into Xposed
As the use of the EdXposed framework needs to be based on the Magisk framework, the phone needs to be brushed into Magisk and Root. As for how to swipe Magisk and Root into Android9.0 devices, you can follow the "Android9.0 Root tutorial Pixel XL". As the EdXposed framework needs to be based on Magisk V17.0 or above, as for the Magisk framework to be brushed in, please use the version provided below.
Magisk GitHub download address
Https://github.com/topjohnwu/Magisk/releases downloads Magisk's latest official zip and apk files
Riru-Core GitHub download address
Https://github.com/RikkaApps/Riru/releases downloads Magisk version of riru-core brushing machine zip
EdXposed GitHub download address
Https://github.com/ElderDrivers/EdXposed/releases downloads the Magisk version of zip and the latest version of EdXposedInstaller Apk. Download the above content
Magisk-v18.1.zip
Magisk-riru-core-v15.zip
Magisk-EdXposed-v0.2.9.9_beta1-release.zip
EdXposedInstaller_v2.2.0-release.apk
After you are ready, first copy the things needed to brush the machine into your hands, enter Magisk and enter magisk-riru-core-v15.zip first, restart the phone, and then enter Magisk and magisk-EdXposed-v0.2.9.9_beta1-release.zip again.
Go to Magisk to check whether the above modules are successfully typed, and check it and restart to activate it. Then install EdXposedInstaller_v2.2.0-release.apk.
If you open EdXposed Installer, if you see a green check, it means that EdXposed's brushing is successful!
Note: in addition to the risk of brushing the machine, you must back up the data before brushing the machine. It is important to keep in mind that EdXposed is a little different from the official original Xposed, at least somewhat flawed, but for Xposed author Rovo89, this is a very mature alternative to Xposed. As an alternative to Xposed, there should be some shortcomings, although it can support most modules, but for the system-related complex modules, the degree of compatibility is poor, such as does not support the status bar class beautification class framework.
Optimize
Remove the wifi cross mark in the domestic network environment, after networking through wifi, the wifi icon of Pixel will display a "cross" by default. Although it can connect to the Internet normally, it is still a nuisance to the obsessive-compulsive disorder.
The rationale explanation for this problem is:
When Google's native Android connects to a mobile data network or WIFI network, its NetworkMonitor module initiates a http request to a specific server and uses the response received to determine the status of the network. Because Google's server is blocked by GFW, so there is no return value, Google Android will put an exclamation point or cross on the signal or wifi.
It can be solved by replacing it with v2ex verification. Execute from a command prompt:
Adb shell settings put global captive_portal_https_url https://www.google.cn/generate_204 then turn on the flight mode, and then turn off the flight mode.
The above is all the contents of the article "how to install xposed to create a mobile security detection tool for Google Pixel XL phones". Thank you for reading! Hope to share the content to help you, more related knowledge, welcome to follow the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.