Android OS for working

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Hello guys ✌ 😁))
Help me figure it out!
If anyone works with banking applications from an Android emulator. Which worker exactly?
The fact is that I tried many emulators trying to flash Magisk. But nothing worked for me with any emulator or version of Magisk.
That is, I cannot overcome the eternal difficulty and start making money.
I tested emulators such as Genimoution, LD player, as well as Android 9, Android 14 - these are all different ISO images.
all this did not produce results.
We also used some alternative build with GIT hub, which killed my OS in VBox.
Maybe there are some new technologies like RDP with Android OS on the network?
Is there really no other option than to really break down the real thing, and if from a certain region it will work in the US, will the Global version work?
This is my cry from the heart because all financial apps require you to install apps on your phone.

------

Привет, ребята ✌ 😁))
Помогите мне разобраться!
Если кто работает с банковскими приложениями из эмулятора Android. Какой именно воркэр?
Дело в том, что я перепробовал множество эмуляторов, пытаясь прошить Magisk. Но ни с одним эмулятором, ни с одной версией Magisk у меня ничего не получилось.
То есть я не могу преодолеть вечную трудность и начать зарабатывать деньги.
Я тестировал такие эмуляторы, как Genimoution, LD player, а также Android 9, Android 14 — это все разные ISO-образы.
все это не дало результатов.
Мы также использовали какую-то альтернативную сборку с GIT-хабом, которая убила мою ОС в VBox.
Может быть, есть какие-то новые технологии, такие как RDP с ОС Android в сети?
Неужели нет другого выхода, кроме как по-настоящему разбить настоящее устройство, и если из какого-то региона оно подойдет для работы в США, подойдет ли версия Global?
Это мой крик души, потому что все финансовые приложения требуют установки приложений на ваш телефон.
 
Last edited by a moderator:

Carding Forum

Professional
Messages
2,781
Reputation
8
Reaction score
1,085
Points
113

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Привет.
Предлагаю вам попробовать эмулятор Android под названием «Nox».
Кардинг с телефона всегда лучше, чем с компьютера или ноутбука, так как проще обойти защиту сайта от мошенничества.

Ниже я подготовил для вас руководства для изучения:
Спасибо большое, обязательно все это изучу. Сейчас тестирую официальный эмулятор Android от Google и плагин для браузера Chrome, который эмулирует Android
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Итак, я продолжаю изучать то, что было запланировано на сегодня.
Это означает официальный эмулятор игр Google для разработчика под Windows 10. Не подходит: 1. это не Play Market, 2. не работает во вложенной виртуализации. То есть в Inside OS VBox.
This plugin is a complete sham. Not true
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Continuing to study the topic, I noticed one application - a crypto wallet for Windows, which is located in the Microsoft store. Yes, this does not mean that it works, but that this application is developed for many platforms such as Android, Apple, Linux and Windows. It seems to allow you to buy cryptocurrencies using credit cards. (this was the search query)
This is the only successful catch for today. I'll test it. I'll write back later.
In the meantime, I’d like to remember how to set a proxy on the Windows OS. Does anyone remember?
 

Carding Forum

Professional
Messages
2,781
Reputation
8
Reaction score
1,085
Points
113
Do you want to configure a proxy in Nox emulator or Windows OS?
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Привет.
Предлагаю вам попробовать эмулятор Android под названием «Nox».
Кардинг с телефона всегда лучше, чем с компьютера или ноутбука, так как проще обойти защиту сайта от мошенничества.

Ниже я подготовил для вас руководства для изучения:

Хотите настроить прокси в эмуляторе Nox или ОС Windows?
Я подробно изучаю ваш материал, который вы мне дали. По ходу возникают вопросы, кому их задать?
1. Работает ли проигрыватель nox во вложенной виртуализации VBox?
2.Gennimotion как настроить? Он не совместим с Magisk.
3. Мне нужны apk из плей маркета. Их нет ни в корзине, ни в apk pur. Я где-то нашел apk, но при установке приложение запросило обновление из плей маркета.
4. Единственный эмулятор, который запустился во вложенной виртуализации - SmartGaga. Но почему-то крашится play market. Сам эмулятор работает.
5. Все банковские приложения требуют установки APK или .ipo
Мне понравился метод настройки nox
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Хотите настроить прокси-сервер на эмуляторе Nox или ОС Windows?
Я знаю, какое приложение из Google Play успешно работает с прокси.
Мне интересно, могу ли я сначала скачать все apk из маркета для работы, а затем очистить его nox player.
Я вообще считаю, что использование VBox нецелесообразно. Как вы думаете, лучше ли установить скрытую ОС для работы? VBox не может работать с приложением, требующим OpenGL.
Дальше
При установке машины Genimmotion на Host, и установке Textnow apk, пишет, что приложение не зарегистрировано, Javascript отключен.
Дальше
Есть информация, что вместе с apk выбирается дополнительное ПО. Для обнаружения устройств эмуляции.
Из первого видео просто настройка Nox player вместо VBox. То есть working из браузера FF, а не из приложения.
 

Carding Forum

Professional
Messages
2,781
Reputation
8
Reaction score
1,085
Points
113
Если вы дорожите анонимностью, то лучше всего установить Nox на виртуальную машину.
Работать с другими эмуляторами я не пробовал.
Ещё лучше купить недорогой телефон на Android и работать с него. Есть много мануалов по его настройке.
В этом случае все необходимые приложения будут скачены и установлены без ошибок.
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Если вы дорожите анонимностью, то лучше всего установить Nox на виртуальную машину.
Работать с другими эмуляторами я не пробовал.
Ещё лучше купить недорогой телефон на Android и работать с него. Есть много мануалов по его настройке.
В этом случае все необходимые приложения будут скачены и установлены без ошибок.
But setup android very hard! activation SU with Magisk & TWRP . For set up application. for a change fingerprint.
OK Im download and set up NOX!!
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Если вы дорожите анонимностью, то лучше всего установить Nox на виртуальную машину.
Работать с другими эмуляторами я не пробовал.
Ещё лучше купить недорогой телефон на Android и работать с него. Есть много мануалов по его настройке.
В этом случае все необходимые приложения будут скачены и установлены без ошибок.
I don’t understand, are you working with NOX in nested virtualization? Well, that is, you launch Windows in VBox and download NOX and launch it?
I can't start it.
Or are you using Lineage OS NOX?
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Если вы дорожите анонимностью, то лучше всего установить Nox на виртуальную машину.
Работать с другими эмуляторами я не пробовал.
Ещё лучше купить недорогой телефон на Android и работать с него. Есть много мануалов по его настройке.
В этом случае все необходимые приложения будут скачены и установлены без ошибок.
NOX player does not work in VBox, since it is already a virtual environment.
There is a video on YouTube of someone launching Nox on VBox - I do the same thing - it doesn’t work.
installed it on the host in an encrypted disk - do you think this will work?
There are no other options.
All carding stopped at this point. And I can't give up and forget. And I need to switch my attention to something else.
Please advise something. It turns out that VBox with Win 10 is a useless thing??
 

Carding Forum

Professional
Messages
2,781
Reputation
8
Reaction score
1,085
Points
113
Try installing the latest version of the emulator on your main Windows 10 or 11 system
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
So the problem persists. And I found information like bypassing root detection and emulator detection
Any thoughts on this method?
Use Frida software?
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3

Bypassing Root Detection and Emulator Detection in Android Apps using Frida​

Introduction:​

Root Detection is one of the most common client-side protection techniques used by Android Application developers. During a penetration test, it is often required to bypass root detection to be able to effectively pentest the application. In this article, we are going to cover root detection and emulator detection bypass techniques, which can be helpful for both pentesters as well as developers. First, we will begin by understanding what root detection and emulator detection are and then we will go through some bypass techniques for these.

What is root detection?​

To understand root detection, let us first understand what rooting is. Rooting is the process of obtaining the highest privileges possible on the operating system. In android, rooting gives the ability to alter or replace system applications, files, and settings, run specialized applications (“apps”) that require administrator-level permissions.

Root detection is the process of detecting if a device is rooted. This is typically done when launching the application. Sometimes the root checks are implemented in the apps in such a way that the application will not respond or it will exit when it is run on a rooted device.

What is emulator detection?​

When a security professional performs vulnerability assessments on mobile applications, some of them use emulators like Genymotion or the ones that come inbuilt with AndroidStudio. Some Application developers choose to implement the code to detect whether the application is being run on an emulator or android device. There are several ways emulator detection can be implemented such as by retrieving the hardware information.

A pentester needs to go through the source code by using reverse engineering with the help of tools like apktool or jadx. This will help him/her understand where and what type of detection is implemented.

Why should developers implement root/emulator detection as a security measure?​

When an application is run on a rooted device, any malicious application running on the device will be able to access the data associated with our application, which is otherwise restricted in non rooted devices. Therefore developers need to implement complex code for detection of the root process in the device where the application is getting launched. Similarly, developers can use different techniques to detect if the app is being run on an emulator. Implementing emulator detection checks will force a user to use the app only on a physical device, which is reasonably safe from a security standpoint.

Introduction to Frida​

Frida is an open-source dynamic instrumentation toolkit, which implements JavaScript code injection by writing code directly into process memory, along with a powerful API that provides a lot of useful functionality, including calling and hooking native functions and injecting structured data into memory.

By using frida we can inject the javascript code at runtime and bypass many checks which are implemented by developers such as root detection, SSL pinning, emulator detection etc. In this section of the article, we will discuss how to bypass root detection and emulator detection by using frida.

We will use androgoat, which is an intentionally vulnerable android app for this demonstration.

Bypassing Root detection using frida​

In our lab setup, the Androgoat android application is installed to demonstrate the step by step process to bypass root detection.

Step 1: First, we will begin by using an emulator i.e virtual device from android studio for the demonstration. While exploring the application, there is a button named root detection which is intentionally designed to check if the device is rooted or not.

As shown in the following image, there is a toast message shown when the CHECK ROOT button is clicked. The message “Device is rooted” confirms that we are running the app on a rooted device.


1721774366279.png

Step 2: Pentester often needs to check the root detection code implemented by the developer by reverse engineering the target app, which is androgoat.apk in this case. This can be done using jadx or jd-gui.

Below is the code snippet in which the developer wants to check the existence of su binaries,superuser.apk, Xposed framework etc. These binaries and supersuer.apk are only found in rooted devices, and if these binaries and superuser.apk are present in the defined directory then the function isRooted() will return a boolean value true indicating that the device is rooted.

Code:
public final boolean isRooted()

{

String[] arrayOfString = new String[13];

int i = 0;

arrayOfString[0] = “/system/app/Superuser/Superuser.apk”;

arrayOfString[1] = “/system/app/Superuser.apk”;

arrayOfString[2] = “/sbin/su”;

arrayOfString[3] = “/system/bin/su”;

arrayOfString[4] = “/system/xbin/su”;

arrayOfString[5] = “/data/local/xbin/su”;

arrayOfString[6] = “/data/local/bin/su”;

arrayOfString[7] = “/system/sd/xbin/su”;

arrayOfString[8] = “/system/bin/failsafe/su”;

arrayOfString[9] = “/data/local/su”;

arrayOfString[10] = “/su/bin/su”;

arrayOfString[11] = “re.robv.android.xposed.installer-1.apk”;

arrayOfString[12] = “/data/app/eu.chainfire.supersu-1/base.apk”;

boolean bool = false;

int j = arrayOfString.length;

while (i < j)

{

bool = new File(arrayOfString[i]).exists();

if (bool) {

return bool;

}

i += 1;

}

return bool;

}
Step 3: Now, by using frida we can bypass this root detection functionality of the target android application. To do this, we need to write JavaScript code, which can be injected into the app’s runtime by using frida.

The code snippet shows that the implementation of isRooted function always returns true. As we can notice, the java function isRooted() is given a new implementation by specifying the package name and class name i.e owasp.sat.agoat and RootDetectionActivity respectively. The return value for this function isRooted() is set to be false. The androgoat’s original code returns true when root detection is successful. So we are returning the value as false during runtime to bypass this.
Code:
‘use strict’

if(Java.available){

Java.perform(function(){

try{

var Activity = Java.use(“owasp.sat.agoat.RootDetectionActivity”);

Activity.isRooted.implementation = function() {

return false;

}

}

catch(error){

console.log(“[-] Error Detected”);

console.log((error.stack));

}

});

}

else {

console.log(“ “)

console.log(“[-] Java is Not available”);

}
Step 4: Now we can save his code as rootdetect.js and inject the code using frida. Note that we should start the frida server in the emulator through adb shell before injecting the frida script into the app. The following figure shows that Frida server is started.
1721774614513.png

Step 5: Now, it’s time to inject the javascript code using frida. The script will provide a new definition to the function and when it is invoked, it will always return the value as false.

Let us run frida and load the script as shown in the following command. The launched application will be in paused state and running the command %resume will resume the application’s execution.
1721774665625.png

After injecting the frida script shown earlier into the app, we can observe that the root detection is bypassed. Access the application installed on the emulator and click the button “CHECK ROOT”.
1721774700996.png

The preceding image shows the toast message Device is not Rooted indicating that we have successfully bypassed root detection.

Bypassing Emulator detection using frida​

Now that we have discussed how to bypass Root Detection in Androgoat Android application, let us discuss how we can use the same technique to bypass emulator detection in Androgoat.

As shown earlier, the Androgoat android application is installed to demonstrate the step by step process to bypass emulator detection in our lab setup,

Step 1: First, we will begin by using an emulator i.e virtual device from android studio for the demonstration. While exploring the application, there is a button named emulator detection, Inside which there is a button which is for checking emulator i.e “Check emulator”. It is obvious that this button is checking whether the application is running on an emulator or not.

As shown in the following image, there is a toast message shown when the CHECK EMULATION button is clicked. The message “This is Emulator” confirms that we are running the app on an emulator.
1721774737457.png


Step 2: Like we did earlier, we will need to check the emulator detection code implemented by the developer by reverse engineering the target app using tools like jadx or jd-gui.

Below is the code snippet in which the developer is checking if the app is running on an emulator.
Code:
public final boolean isEmulator()

{

Object localObject = new StringBuilder();

((StringBuilder)localObject).append(Build.FINGERPRINT);

((StringBuilder)localObject).append(Build.DEVICE);

((StringBuilder)localObject).append(Build.MODEL);

((StringBuilder)localObject).append(Build.BRAND);

((StringBuilder)localObject).append(Build.PRODUCT);

((StringBuilder)localObject).append(Build.MANUFACTURER);

((StringBuilder)localObject).append(Build.HARDWARE);

localObject = ((StringBuilder)localObject).toString();

if (localObject != null)

{

localObject = ((String)localObject).toLowerCase();

Intrinsics.checkExpressionValueIsNotNull(localObject, “(this as java.lang.String).toLowerCase()”);

CharSequence localCharSequence1 = (CharSequence)localObject;

CharSequence localCharSequence2 = (CharSequence)”generic”;

boolean bool = false;

if ((StringsKt.contains$default(localCharSequence1, localCharSequence2, false, 2, null)) || (StringsKt.contains$default((CharSequence)localObject, (CharSequence)”unknown”, false, 2, null)) || (StringsKt.contains$default((CharSequence)localObject, (CharSequence)”emulator”, false, 2, null)) || (StringsKt.contains$default((CharSequence)localObject, (CharSequence)”sdk”, false, 2, null)) || (StringsKt.contains$default((CharSequence)localObject, (CharSequence)”vbox”, false, 2, null)) || (StringsKt.contains$default((CharSequence)localObject, (CharSequence)”genymotion”, false, 2, null)) || (StringsKt.contains$default((CharSequence)localObject, (CharSequence)”x86", false, 2, null)) || (StringsKt.contains$default((CharSequence)localObject, (CharSequence)”goldfish”, false, 2, null)) || (StringsKt.contains$default((CharSequence)localObject, (CharSequence)”test-keys”, false, 2, null))) {

bool = true;

}

return bool;
In the preceding code snippet, isEmulator() is checking for some values from the device configuration. If the extracted configuration contains strings like emulator, unknown, sdk, vbox, genymotion the device will be considered an emulator and the function return a boolean value true indicating that the app is running on an emulator.

Step 3: Once again, let us see the steps to bypass this check using frida. Let us first ensure that the frida server is running on the emulator as shown in the figure below.
1721774846271.png

Step 4: Following is the frida script written to bypass the emulator detection check in Androgiat. The script has a custom implementation for the method isEmulator within the class owasp.sat.agoat.EmulatorDetectionActivity. Every time the isEmulator method is triggered in the app, this custom implementation will be executed. This implementation always returns false fooling the emulator detection check.
Code:
‘use strict’

if(Java.available){

Java.perform(function(){

try{

var Activity = Java.use(“owasp.sat.agoat.EmulatorDetectionActivity”);

Activity.isEmulator.implementation = function() {

return false;

}

}

catch(error){

console.log(“[-] Error Detected”);

console.log((error.stack));

}

});

}

else {

console.log(“ “)

console.log(“[-] Java is Not available”);

}
Step 5: Let us save this code as “emulator detection.js” and inject this js file into the application’s runtime using the following command.

frida -l “emulator detection.js” -U -f owasp.sat.agoat

Running this command will launch the application and the execution will be paused. We can type the command %resume to resume the execution of the app.
1721774948919.png

After running the preceding commands, we can observe that the emulator detection is bypassed. Access the application installed on the emulator and click the button “CHECK EMULATOR”. If everything went as expected, we should observe the toast message “This is not an Emulator” as shown in the following figure.
1721774982057.png


The preceding figure shows that we have successfully bypassed emulator detection in Androgoat application.

Conclusion:​

It is apparent that client-side protections such as root detection and emulator detection can be great to have but they may be easily bypassed using tools like Frida. Complex root detection implementations can slow down the attackers a bit, and such implementations should be considered by developers even though no client-side protections are foolproof. We have also seen the power of Frida in this article. It can help us write powerful scripts to play with the app’s runtime.

If you would like to learn more about Android Security check out our course on “Hacking and Pentesting Android Applications”
Source https://theoffensivelabs.medium.com...tion-in-android-apps-using-frida-e938109e468c

This article was written by Sushma Ahuja for The Offensive Labs.
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Ребята, я вас обожаю.
Придется, наверное, стать Пинтестер, чтобы копить монеты)))
С такими знаниями, мне кажется, можно легально зарабатывать хорошие деньги.
Этот мир сошел с ума.
Я знаю, что с настоящим телефоном работать проще.
Может кто-то работает с эмуляторами и банковскими приложениями, кассовыми приложениями и т.д.
. Помоги мне !!!!!!
Я, наверное, попробую поработать с кредитными картами BTC в веб-браузере.
 
Last edited:

Cloned Boy

Professional
Messages
449
Reputation
2
Reaction score
357
Points
63
Did you manage to configure the system? How can we help you?
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Did you manage to configure the system? How can we help you?

No, according to this manual, I haven’t plucked up the courage yet!
I wanted to know about working with emulators, as I understand it, I won’t be able to work without this guide?
any application - kucoin, cache app, robinhood and others ask you to download the apk and register there. Confirm know your client, and then can launch the web version.
This seems very difficult to me.
I need something simple to get started. I have successful experience of driving into sites with a low level of anti-fraud. 1.how to find such a site? 2. Where can I get numbers to receive SMS? 3. And how to build a chain of something - for example, replenishing a phone account, or E-Gift, or something else!
Moreover, I have experience in verifying a multi-currency wallet with low antifraud!! It was difficult for me to draw the invoice))) how to fake the QUAR code?
and I also saw that you posted a list of anonymous exchanges somewhere!!
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Did you manage to configure the system? How can we help you?
Tomorrow I’ll probably install Python on my PC with i-chat, install Frida-tools, I don’t understand, first you need to launch the application, for example cache app? And then run the script in Frida?
p.s. The message above is just a cry of despair!!
And I have terrible depression.....(
 

Jeannie

Member
Messages
21
Reputation
0
Reaction score
4
Points
3
Did you manage to configure the system? How can we help you?
It turns out that I will have a bunch of frida -
Gennymotion because it does not require SMS to log into your Google account. the rest are kind of dirty - they require SMS - even if the account was registered without receiving SMS.
and this is how it turns out that you need to work with this bundle of software?
 
Top