昨天发现自己有点发烧,今天测一下果然阳了,大早上起来睡不着 。
请假以后正好闲着没事,完善一下之前文章 https://bbs.kanxue.com/thread-273759.htm 。
之前一直想写来着,但是一直没时间 。之前这篇文章介绍了。设备指纹基础对抗思路和原理 。很多都是基础部分 。这一篇将更详细的介绍一些常见的检测思路和方法,还有一些主流对抗手段 。
其中包括很多大厂头疼的一些事情,如何手机恢复出厂设置也能保证设备指纹不发生变化,保证稳定性 。这篇文章里面也都会详细介绍 。
如果没看过我之前的这篇文章,所以没看过的同学可以先看看这个文章 。之前有的这篇文章里面就不多二次介绍了 。
还有就是一个设备指纹大厂会使用多种方式去获取,那么我们应该如何进行对抗 ,我也会在文章里面说一下我自己的见解和方案,如何在一个“最佳”点去解决问题 ,当然如果你有更好的方案,也可以私聊我。
聊到设备指纹最经典的一个字段就是Android id,就我目前所知,他的获取方式不下5种 。分别介绍一下 。
最基础的Android id获取方式 ,这个不多说,直接Hook就行 。
第一种获取以后,系统会把Android id 保存起来,保存到一个HashMap里面,防止多次IPC初始化 ,所以为了验证第一种方法的准确性,可以二次获取cache ,
和上面的Android id进行对比 。9.0以上需要绕过Android id 的反射限制 。具体获取方法如下:
方法3也是很基础的Api ,主要通过ContentResolver 进行间接获取 。很多大厂也都在使用 。
通过query命令去查询,获取Android id ,这种方式底层走的也是ContentResolver
方法4的代码反射实现,我自己测试在高版本总是有问题 ,不是很稳定 ,所以这里面就不发了 。
在设备指纹里面,如果想回复出厂设置也能保证原有的设备信息 ,这个字段可以在服务端的相似度算法里面占比很重 ,可以以型号进行分类。,我之前测试过,回复出厂设置指纹也不发生变化的设备指纹核心的设备指纹就几个 。
比如硬盘大小,ipv6 ,还有一个就是MAC地址,这几个设备指纹也是很核心的设备指纹 。首先先介绍硬盘字节大小。 也是三种获取方法,但是方法底层都是一条系统调用。所以如果要进行对抗的话,只需要在SVC层进行处理即可 。获取三种方法如下 ,不建议分别进行处理,可能会导致有地方泄漏,特别是直接开启一条进程通过execve去执行,然后管道传过来,导致很容易Hook不全。
我之前也是参考的平头哥,Hook的Java方法,但是发现Native层并不能全量拦截 。后来弃用 。平头哥方法代码如下:
上面这种方式只适合Java获取,具体三种获取方法可以看下面 。
这三种方法底层走的都是statfs64 或者statfs函数,对抗的话也很简单,直接在statfs64 或者statfs 的after里面对参数2进行替换和复写即可 。
对抗如下,具体如何拦截svc代码可以参考proot ,可以参考我之前写的文章 https://bbs.kanxue.com/thread-273160.htm
这种方法的好处就是不管如何开进程,都可以在底层统一处理 。
这个没啥好说的,基础字段,Java层获取,netlink获取,命令行获取 。读文件获取,四种获取方法,和上面类似 ,直接在svc的 recvmsg ,recv,recvfrom的after进行数据包替换即可。netlink获取mac方法可以参考我之前的代码 。
https://bbs.kanxue.com/thread-271698.htm
如果判断是netlink的消息,并且是获取网卡类型直接对里面的数据包解析和替换即可 。
在读文件获取这块因为网卡信息已经在内存里面 ,所以直接IO重定向过去即可 。
常用的获取网卡信息的文件 ,以wlan0为例子 ,场景的获取目录如下:可以cat获取,也可以直接读文件 。
这个字段主要是监控群控的一些信息的,主要作用是获取当前wifi 附近的人MAC信息的 。
比如大厂一般检测群控的手段就是获取附近的网卡,如果有聚集性就可以认为是群控 。获取的方式也也跟上面一样 。五种获取方法 。
获取方法底层也是和MAC获取方法一样 ,底层都是netlink,比如可以直接执行 popen获取 ,
也可以直接直接读文件 ,路径如下:
还可以直接netlink获取 ,在收到消息以后判断消息类型是 hdr->nlmsg_type == RTM_NEWNEIGH 直接进行替换即可 。
直接在recv收到消息以后对数据里面的buff进行替换即可 。主要核心代码如下 。包括上面的mac地址替换 。
设个设备指纹也是很核心的设备指纹 ,这个玩意底层获取也是netlink,但是netlink获取,但是这块处理很不好处理 ,我暂时也没进行处理 。
常用的获取方式比如,Java获取 ,命令获取。如果需要进行替换的话 ,只需要处理命令行和Java的Hook即可 。
命令行可以在对方执行命令之前,将命令换成cat命令,去cat自己提前Mock好的文件,效果是一样的 。
当然,还有另一种思路,其实这个字段可以服务端获取,客户端二次上报,进行匹配 。
命令行获取如下,ip命令获取如下 。
打印的内容如下:
这玩意底层走的都是uname函数 ,直接对uname系统调用处理即可 。获取方法比如,也可以直接svc调用uname函数 ,也可以直接根据命令行 ,
修改的话也很简单,直接在uname的after里面直接对数据进行替换即可 。
这个是一个非常非常核心的字段,就是/data/app/随机Base64路径/base.apk
这个随机路径就是设备指纹,比如一些大厂会玩,读取你微信的随机路径,获取微信的包信息,然后获取里面的随机路径
比如微信,快手,京东,淘宝这种随机路径 ,作为核心的唯一设备指纹,只要你不卸载微信,或者其他大厂apk ,你得设备指纹永远不发生变化,无论你如何修改他自己Apk里面的信息,跟他都不产生任何影响 。
一般尝试比如小米之类的,登入了指定账号,可以得到一个账号的id信息 ,这个也需要处理一下 。最好的办法是不登入账号 。
检测环境大多数围绕Hunter的源码检测思路去复现 ,很多都是Hunter的源码 ,很多也都是行业内没有公开的一些检测思路 ,现在市面上检测已经很多没更新了 ,加速行业内卷,我辈刻不容缓 。 :)
提到环境检测不得不说的就是Apk重打包检测 ,现在检测方法千奇百怪,我这边也是一一罗列一下,把一些可能存在的风险点,检测和绕过的原理详细叙述一下 。当然如果你有更好的思路也可以在文章下面留言。
想要绕过签名检测最好的办法或者说成本最低有效的办法就是修改完毕以后不签名配合核心破解直接安装。
核心破解是lsp的模块,lsp商店直接下载,Hook apk的系统签名解析方法,直接绕过签名检测流程 ,已实现不签名直接安装 。
首先先说一下大厂或者一些企业壳的检测点,Java层基础的获取签名的方法这块就不一一叙述了 。
这块以Hunter 源码开始介绍 。
核心就三部分 。
针对上面的检测对抗也很简单,对svc的openat拦截了以后,对readlinkat和stat函数进行处理即可 。很轻松即可绕过检测 。很多加壳基本都是检测ROOT检测LSP调用栈之类的 ,并不只是单一的去检测签名一个纬度 。比如发现了开启了seccomp就会闪退,发现Root就会闪退 。
这里先说一下Hunter的Java层检测签名的方法,这块相当于反射CREATOR 变量,这个变量是保存一些IPC通讯的东西 。
很多攻击者会用Lspatch进行打包 ,对变量进行替换,这时候我们去检测这个变量的Classloader是不是系统ClassLoader 。
防止被替换 。
对抗的方法主要下面三种:
现在大厂一般会直接通过IPC直接和PMS进行通讯 ,不过这种思路也很好过 ,我这边也是参考的Lspatch 。
这块有两个很核心的思路 ,就是拦截Binder IPC通讯的方法,和Hook 服务端的签名解析方法 。代码如下:
在系统进行签名解析的时候进行签名替换替换 。
这个思路也是抄的lspatch ,这种思路可以通过检测CREATOR 变量Classloader的方式检测出来 。
有很多大厂会自己伪造IPC和服务端进行通讯,用这种方法可以进行签名的修改和替换,实现思路主要就是Hook binder通讯解析的方法 。判断如果传输类型数据是获取签名的话就进行替换 。主要思路就是Hook传输数据的“水管”,对水管里面的内容进行替换 。
不知道为什么lspatch新版本把这段代码删除了 ,只采用了替换CREATOR 和Hook服务端解析签名的方法 。
代码如下:
还有很多很好思路的代码 ,比如ISO线程去读取apk签名信息,防止SVC被IO重定向掉 。
当然检测签名的方法肯定不止这些,如果有更好的,我没写的,也可以在文章下面留言 。
Java层基础的获取api架构啥的,这块就不一一叙述了 。
主要思路来自B哥 ,感谢B个 ,先安装seccomp架子 。
配合上面的代码 。启动调用getpid, 上面的架子会对getpid函数进行拦截 ,然后架构进行判断 。
这块思路主要来自非虫 ,在次感谢 。
这块思路还是很多的,不同的云手机检测的思路也不一样 。大部分云手机做的还是很好的,很多都可以过掉Hunter的检测 。
判断摄像头有个数 。
这块思路就是直接获取个数,少于10个可以直接认定为黑产 。 我目前没发现那个手机少于10个传感器 ,这块如果可能的话可以尝试调用一下传感器,保证传感器是否可用 ,防止云手机以假乱真 。
这块检测思路主要是检测传感器的名称,正常小米之类的手机他是不可能存在叫什么 AOSP的传感器的 。
这种AOSP基本都是自己编译的ROM ,所以这块也可以作为监测点 。可以上报传感器的一些名称信息,也是环境检测一个很重要的抓手 。
一般小白肯定不会说去改传感器名称 。
这块就是去遍历mounts 下面这几个文件,检测里面是否包含docker关键字 ,防止一些云手机搞虚拟化,通过使用docker进行挂载 。
这块也是很好的监测点 。
这块思路主要好多种 ,主要是为了防止一些自定义ROM ,通过修改机型的方法,绕过自定义ROM检测逃逸 。
可以直接执行getprop 把所有的环境信息都拿到手 ,如果是小米手机,里面环境信息里面,肯定是有MIUI关键字。
比如小米的手机,我会去检测是否包含这几个关键环境信息 。
这块可以采集以后服务端进行判断 。防止自定义ROM 机型伪造 。
这块还是执行 service list ,一般小米手机之类的,都会有小米的系统服务,这种东西很难去伪造,如果他伪造了假的 。你就尝试调用即可 。
这块还是建议上传到服务端,由服务端算法同学去根据相似度算法去推断 ,不要再本地进行判断 ,因为Hunter是非联网Apk,所以只是在客户端打了个样子 。
这块检测方法千奇百怪,首先最基本maps去检测frida或者根据调用栈检测lsp特征 ,基础的检测方案不说了 。因为我觉得并不是一个很好的方案 。改个名就绕过了 。
比如frida特征三件套 。检测思路主要
Hook检测,我们其实只需要检测内存没有被修改即可 。这块需要介绍一下基础原理。和实现的伪代码 。
正常我们知道一个SO加载到内存里,本质上是通过mmap把so分配到内存里面 ,比如A函数的指令是BBB,那么加载到内存里面应该也是BBB 。
记住上面这句话 ,我们就可以对内存里面的指令转换成一个int值,然后累加 。如果内存没有被修改 ,累加值文件里面和内存里面的值应该是一样的 。
因为现在Hook基本都是text段和plt端,一个inlinehook一个got表 。当然Frida可能会延迟启动 ,所以开启一条检测线程,进行轮训操作。
这块还有一个设计问题,很多开发者也都没注意到 ,就是我开启的这一条线程,被攻击者anti掉 应该怎么办呢?
因为想要anti掉一条检测线程,方法太多了,N种方法,比如监听全部线程的文件读写,看看那个线程在读取文件 ,只做这一件事,基本八九不离十 ,
也可以直接Hook开启线程的方法,对开启的线程进行anti 。当然这种思路 就没有好的对抗或者检测办法了么?
其实很简单 ,只需要把在你的检测代码里,对某个变量进行赋值 ,修改flag即可 。
然后第一次检测完毕以后将主进程的某个变量标志为true,可以使用__NR_process_vm_writev ,又因为是异步的关系,主线程可以延迟2秒对这个标识进行获取,判断是否为true ,
以确保检测线程成功开启 。
具体检测流程如下,以检测libc为例子,路径可以换成自己需要的路径 :
首先获取本地So文件的累加值 ,返回execSection 结构体 。
然后和本地的指令去计算 。计算本地的指令方法就是对maps进行遍历,只遍历text和plt段 ,计算累加值和本地进行判断 。
当然这块就一定是比较完善的检测方案了么?其实有很多对抗思路 。比如把maps里面的内存进行隐藏,变成匿名内存,这样他在扫描maps的就找不到,对应的比如上面说的libc的item ,
这块可以参考riru里面的 map_hide ,代码路径如下 :
https://github.com/RikkaApps/Riru/blob/master/riru/src/main/cpp/hide_utils.cpp
当然这种方式一定是安全的么?
其实,不是的,因为在他的这个代码里面我发现存在一个遗漏点,可以作为检测入手点 ,某个加固厂商,不仅仅会对maps item进行遍历 ,还会对里面的匿名内存进行遍历 ,检测匿名内存里面的 magic ,比如so 文件的magic是elf ,如果magic 匹配上一样当maps去解析 去遍历。
所以可以在原有的基础上改改,在将内存变成匿名内存以后,把elf的前四个字节抹掉,也就是magic的 内容,抹掉以后记得把权限修改成和之前的一样 。防止内存检测 。
这块检测核心逻辑全部放在ISO线程检测 。可以配置一个服务,然后服务里使用如下变量即可 。
这个服务非常恶心,一般沙箱对这个线程都会进行跳过 。
这块有人可能会问什么是iso线程?可以理解成一个独立的安全的线程,只能通过和外部IPC交互的方式进行通讯 。useAppZygote 相当于让这个进程运行在Zygote中 。这个时候时机特别早,早到什么程度呢?就连libart.so 都没加载,所以这个检测进程只能调用一些原始的libc方法,不能调用任何Art相关的函数 。
再多的我也不知道了 ,这块具体什么是ISO线程,让GTP回答一下吧,回答如下 :
下面也是主要介绍一下hunter的检测思路 。
主要实现思路就是去检测proc下面是否有除了main进程以外的其他pid ,因为正常启动的话,肯定是只有一个main进程 。
但是沙箱的话会在启动之前去启动别的进程 ,所以这块可以进行bypass 。后面我会统一说这块应该如何对抗 ,包括如何绕过 。
这块先介绍检测思路 ,和检测原理 。这块里面有一个replaceSecInsns是我自己封装的一个函数,我担心 opendir 被Hook了,所以每次执行都去把指令替换成
本地文件的指令,而不是去执行内存里面的指令 。
这块想要绕过也很简单,opendir 底层其实就是 getdents64,getdents 如果遇到你想隐藏的文件直接对文件进行bypass就可以了,直接指向下一个指针 ,
代码来自proot
这块的思路就是检测是否存在其他进程 ,通过执行ps -ef命令 。
可以先伪造一个正常的文件,在执行到 ps -ef的时候把命令换成cat 你自己的文件 即可 。
这块的实现思路就是,检测内存里面的 Activity 或者 Application的个数 。正常我们的apk启动只会有我们自己的
Application,沙箱因为预启动的关系,会存在其他的Application ,这块也是一个很好的检测思路 。
因为在国内手机里基本Google和lineageos都是黑产的标配 ,大部分都是自己刷的ROM 。
这种手机理论上在国内 不应该出现,如果出现也会被打上标签,被认定为黑产 。可以直接Build.MODEL 获取厂商 。
另外这块还有一个细节点 ,就是lineageos一个特有文件/system/addon.d 。具体如下 。
当然这块有一个细节点:
直接获取 ro.build.display.id 可能会被Hook ,所以这块我的建议是直接去解析配置文件 。
核心解析(/dev/properties/u:object_r: )文件方法如下 :
这块检测方法太多了,我知道的就不下于10种,比如核心A和B方法里面加个时间搓,如果A执行到B大于5秒就可以认为被调试 。
检测调试状态也是很不错的选择,不过这块可以利用ISO线程去检测调试状态,防止被ptrace
也可以执行 "service list" 获取服务列表 ,判断是否包含frida关键字 。
如果你使用了这个帖子里面的代码,请备注出处 。感谢理解 !
/
/
原始获取android
id
String androidId
=
Settings.Secure.getString(context.getContentResolver(), Settings.Secure.ANDROID_ID);
CLog.i(String.
format
(
"android_id -> 2222 %s"
, androidId));
/
/
原始获取android
id
String androidId
=
Settings.Secure.getString(context.getContentResolver(), Settings.Secure.ANDROID_ID);
CLog.i(String.
format
(
"android_id -> 2222 %s"
, androidId));
/
/
通过反射查询android
id
cache
ArrayMap mValues
=
null;
try
{
Field sNameValueCache
=
Settings.Secure.
class
.getDeclaredField(
"sNameValueCache"
);
sNameValueCache.setAccessible(true);
Object
sLockSettings
=
sNameValueCache.get(null);
Field fieldmValues
=
sLockSettings.getClass().getDeclaredField(
"mValues"
);
fieldmValues.setAccessible(true);
mValues
=
(ArrayMap<String,String>) fieldmValues.get(sLockSettings);
String android_id
=
(String)mValues.get(
"android_id"
);
CLog.i(String.
format
(
"android_id -> 3333 %s"
, android_id));
} catch (Throwable e) {
e.printStackTrace();
}
/
/
通过反射查询android
id
cache
ArrayMap mValues
=
null;
try
{
Field sNameValueCache
=
Settings.Secure.
class
.getDeclaredField(
"sNameValueCache"
);
sNameValueCache.setAccessible(true);
Object
sLockSettings
=
sNameValueCache.get(null);
Field fieldmValues
=
sLockSettings.getClass().getDeclaredField(
"mValues"
);
fieldmValues.setAccessible(true);
mValues
=
(ArrayMap<String,String>) fieldmValues.get(sLockSettings);
String android_id
=
(String)mValues.get(
"android_id"
);
CLog.i(String.
format
(
"android_id -> 3333 %s"
, android_id));
} catch (Throwable e) {
e.printStackTrace();
}
try
{
Bundle callResult
=
context.getContentResolver().call(
Uri.parse(
"content://settings/secure"
),
"GET_secure"
,
"android_id"
, new Bundle()
);
String androidIdValue
=
callResult.getString(
"value"
);
CLog.i(String.
format
(
"android_id -> 1111 %s"
, androidIdValue));
} catch (Exception e) {
CLog.e(e.toString(), e);
}
try
{
Bundle callResult
=
context.getContentResolver().call(
Uri.parse(
"content://settings/secure"
),
"GET_secure"
,
"android_id"
, new Bundle()
);
String androidIdValue
=
callResult.getString(
"value"
);
CLog.i(String.
format
(
"android_id -> 1111 %s"
, androidIdValue));
} catch (Exception e) {
CLog.e(e.toString(), e);
}
/
/
通过content命令查询android
id
String android_id
=
NativeEngine.popen(
"content query --uri content://settings/secure --where \"name=\\'android_id\\'\""
,
"");
CLog.i(String.
format
(
"android_id -> 4444 %s"
, android_id));
/
/
通过content命令查询android
id
String android_id
=
NativeEngine.popen(
"content query --uri content://settings/secure --where \"name=\\'android_id\\'\""
,
"");
CLog.i(String.
format
(
"android_id -> 4444 %s"
, android_id));
jclass pJclass
=
env
-
>FindClass(
"android/os/StatFs"
);
jmethodID
id
=
env
-
>GetMethodID(pJclass,
"<init>"
,
"(Ljava/lang/String;)V"
);
jobject pJobject
=
env
-
>NewObject(pJclass,
id
, env
-
>NewStringUTF(
"/storage/emulated/0"
));
jlong i
=
env
-
>CallLongMethod(pJobject, env
-
>GetMethodID(pJclass,
"getTotalBytes"
,
"()J"
));
LOG(ERROR) <<
"Java获取getTotalBytes "
<<i;
char
buffer
[
1024
];
FILE
*
fp
=
popen(
"stat -f /storage/emulated/0"
,
"r"
);
if
(fp !
=
nullptr) {
while
(fgets(
buffer
, sizeof(
buffer
), fp) !
=
nullptr) {
/
/
LOGI(
"ps -ef %s"
,
buffer
)
LOG(INFO) <<
"stat -f /storage/emulated/0"
<<
buffer
;
}
pclose(fp);
}
struct statfs64 buf
=
{};
if
(statfs64(
"/storage/emulated/0"
, &buf)
=
=
-
1
) {
LOG(ERROR) <<
"statfs64系统信息失败"
;
return
;
}
LOG(INFO) <<
"f_type (文件系统类型): "
<< buf.f_type;
LOG(INFO) <<
"f_bsize (块大小): "
<< buf.f_bsize;
LOG(INFO) <<
"f_blocks (总数据块): "
<< buf.f_blocks;
LOG(INFO) <<
"f_bfree (空闲块): "
<< buf.f_bfree;
LOG(INFO) <<
"f_bavail (非特权用户可用的空闲块): "
<< buf.f_bavail;
LOG(INFO) <<
"f_files (总文件节点数): "
<< buf.f_files;
LOG(INFO) <<
"f_ffree (空闲文件节点数): "
<< buf.f_ffree;
LOG(INFO) <<
"f_fsid (文件系统 ID): "
<< buf.f_fsid.__val[
0
] <<
", "
<< buf.f_fsid.__val[
1
];
LOG(INFO) <<
"f_namelen (最大文件名长度): "
<< buf.f_namelen;
jclass pJclass
=
env
-
>FindClass(
"android/os/StatFs"
);
jmethodID
id
=
env
-
>GetMethodID(pJclass,
"<init>"
,
"(Ljava/lang/String;)V"
);
jobject pJobject
=
env
-
>NewObject(pJclass,
id
, env
-
>NewStringUTF(
"/storage/emulated/0"
));
jlong i
=
env
-
>CallLongMethod(pJobject, env
-
>GetMethodID(pJclass,
"getTotalBytes"
,
"()J"
));
LOG(ERROR) <<
"Java获取getTotalBytes "
<<i;
char
buffer
[
1024
];
FILE
*
fp
=
popen(
"stat -f /storage/emulated/0"
,
"r"
);
if
(fp !
=
nullptr) {
while
(fgets(
buffer
, sizeof(
buffer
), fp) !
=
nullptr) {
/
/
LOGI(
"ps -ef %s"
,
buffer
)
LOG(INFO) <<
"stat -f /storage/emulated/0"
<<
buffer
;
}
pclose(fp);
}
struct statfs64 buf
=
{};
if
(statfs64(
"/storage/emulated/0"
, &buf)
=
=
-
1
) {
LOG(ERROR) <<
"statfs64系统信息失败"
;
return
;
}
LOG(INFO) <<
"f_type (文件系统类型): "
<< buf.f_type;
LOG(INFO) <<
"f_bsize (块大小): "
<< buf.f_bsize;
LOG(INFO) <<
"f_blocks (总数据块): "
<< buf.f_blocks;
LOG(INFO) <<
"f_bfree (空闲块): "
<< buf.f_bfree;
LOG(INFO) <<
"f_bavail (非特权用户可用的空闲块): "
<< buf.f_bavail;
LOG(INFO) <<
"f_files (总文件节点数): "
<< buf.f_files;
LOG(INFO) <<
"f_ffree (空闲文件节点数): "
<< buf.f_ffree;
LOG(INFO) <<
"f_fsid (文件系统 ID): "
<< buf.f_fsid.__val[
0
] <<
", "
<< buf.f_fsid.__val[
1
];
LOG(INFO) <<
"f_namelen (最大文件名长度): "
<< buf.f_namelen;
private void relocateRomMemInfo(VirtualBaseInfo virtualBaseInfo) {
final String androidSystemOsClassName
=
"android.system.Os"
;
Class<?> androidSystemOsClass
=
RposedHelpers.findClassIfExists(androidSystemOsClassName, ClassLoader.getSystemClassLoader());
if
(androidSystemOsClass
=
=
null) {
CLog.e(
">>>>>>>>>>>>> vfs android.system.Os not found"
);
return
;
}
RposedHelpers.findAndHookMethod(androidSystemOsClass,
"statvfs"
, String.
class
, new RC_MethodHook() {
@Override
protected void afterHookedMethod(MethodHookParam param) throws Throwable {
if
(param.getResult()
=
=
null) {
return
;
}
StructStatVfs structStatVfs
=
(StructStatVfs) param.getResult();
if
(structStatVfs.f_blocks
=
=
0
) {
return
;
}
if
(param.args[
0
] instanceof String) {
long
mockRomOut
=
getMockRomOut(structStatVfs.f_blocks, virtualBaseInfo, structStatVfs.f_blocks);
CLog.i(TAG,
"vfs statvfs path:"
+
param.args[
0
]
+
" f_blocks:"
+
structStatVfs.f_blocks
+
" mock value:"
+
mockRomOut);
RposedHelpers.setObjectField(
structStatVfs,
"f_blocks"
,
mockRomOut
);
}
}
});
}
private void relocateRomMemInfo(VirtualBaseInfo virtualBaseInfo) {
final String androidSystemOsClassName
=
"android.system.Os"
;
Class<?> androidSystemOsClass
=
RposedHelpers.findClassIfExists(androidSystemOsClassName, ClassLoader.getSystemClassLoader());
if
(androidSystemOsClass
=
=
null) {
CLog.e(
">>>>>>>>>>>>> vfs android.system.Os not found"
);
return
;
}
RposedHelpers.findAndHookMethod(androidSystemOsClass,
"statvfs"
, String.
class
, new RC_MethodHook() {
@Override
protected void afterHookedMethod(MethodHookParam param) throws Throwable {
if
(param.getResult()
=
=
null) {
return
;
}
StructStatVfs structStatVfs
=
(StructStatVfs) param.getResult();
if
(structStatVfs.f_blocks
=
=
0
) {
return
;
}
if
(param.args[
0
] instanceof String) {
long
mockRomOut
=
getMockRomOut(structStatVfs.f_blocks, virtualBaseInfo, structStatVfs.f_blocks);
CLog.i(TAG,
"vfs statvfs path:"
+
param.args[
0
]
+
" f_blocks:"
+
structStatVfs.f_blocks
+
" mock value:"
+
mockRomOut);
RposedHelpers.setObjectField(
structStatVfs,
"f_blocks"
,
mockRomOut
);
}
}
});
}
/
/
int
statfs(const char
*
path, struct statfs
*
buf);
/
/
int
statfs64(const char
*
path, struct statfs64
*
buf);
case SC_statfs:
case SC_statfs64: {
if
(isMockFingerptint()) {
if
((
int
) syscall_result <
0
) {
break
;
}
/
/
f_type:文件系统类型。
/
/
f_bsize:文件系统块的大小。
/
/
f_blocks:文件系统中的总块数。
/
/
f_bfree:文件系统中的可用块数。
/
/
f_bavail:非超级用户可获取的块数。
/
/
f_files:文件系统中的总文件节点数。
/
/
f_ffree:文件系统中的可用文件节点数。
/
/
f_fsid:文件系统标识。
/
/
f_namelen:文件名的最大长度。
char pathBuff[PATH_MAX];
word_t pPath
=
peek_reg(tracee, ORIGINAL, SYSARG_1);
int
ret
=
read_string(tracee, pathBuff, pPath, PATH_MAX);
if
(ret <
0
){
break
;
}
if
(get_sysnum(tracee, ORIGINAL)
=
=
SC_statfs64){
struct statfs64 fs
=
{};
word_t arg2
=
peek_reg(tracee, ORIGINAL, SYSARG_2);
read_data(tracee,&fs,arg2,sizeof (struct statfs64));
NativeFingerHandler::StatfsHandler64(pathBuff,&fs);
write_data(tracee,arg2,&fs,sizeof (struct statfs64));
}
else
{
struct statfs fs
=
{};
word_t arg2
=
peek_reg(tracee, ORIGINAL, SYSARG_2);
read_data(tracee,&fs,arg2,sizeof (struct statfs));
NativeFingerHandler::StatfsHandler32(pathBuff,&fs);
write_data(tracee,arg2,&fs,sizeof (struct statfs));
}
}
break
;
}
/
/
int
statfs(const char
*
path, struct statfs
*
buf);
/
/
int
statfs64(const char
*
path, struct statfs64
*
buf);
case SC_statfs:
case SC_statfs64: {
if
(isMockFingerptint()) {
if
((
int
) syscall_result <
0
) {
break
;
}
/
/
f_type:文件系统类型。
/
/
f_bsize:文件系统块的大小。
/
/
f_blocks:文件系统中的总块数。
/
/
f_bfree:文件系统中的可用块数。
/
/
f_bavail:非超级用户可获取的块数。
/
/
f_files:文件系统中的总文件节点数。
/
/
f_ffree:文件系统中的可用文件节点数。
/
/
f_fsid:文件系统标识。
/
/
f_namelen:文件名的最大长度。
char pathBuff[PATH_MAX];
word_t pPath
=
peek_reg(tracee, ORIGINAL, SYSARG_1);
int
ret
=
read_string(tracee, pathBuff, pPath, PATH_MAX);
if
(ret <
0
){
break
;
}
if
(get_sysnum(tracee, ORIGINAL)
=
=
SC_statfs64){
struct statfs64 fs
=
{};
word_t arg2
=
peek_reg(tracee, ORIGINAL, SYSARG_2);
read_data(tracee,&fs,arg2,sizeof (struct statfs64));
NativeFingerHandler::StatfsHandler64(pathBuff,&fs);
write_data(tracee,arg2,&fs,sizeof (struct statfs64));
}
else
{
struct statfs fs
=
{};
word_t arg2
=
peek_reg(tracee, ORIGINAL, SYSARG_2);
read_data(tracee,&fs,arg2,sizeof (struct statfs));
NativeFingerHandler::StatfsHandler32(pathBuff,&fs);
write_data(tracee,arg2,&fs,sizeof (struct statfs));
}
}
break
;
}
case SC_recvmsg: {
/
/
LOGI(
"start handle SC_recvmsg systexit after"
)
if
(isMockFingerptint()) {
NetlinkMacHandler::netlinkHandler_recmsg(tracee);
}
break
;
}
case SC_recv:
case SC_recvfrom: {
/
/
LOGE(
"start handle SC_recvfrom systexit after"
)
/
/
recv底层走的recvfrom,所以不需要处理recvfrom
if
(isMockFingerptint()) {
NetlinkMacHandler::netlinkHandler_recv(tracee);
}
break
;
}
case SC_recvmsg: {
/
/
LOGI(
"start handle SC_recvmsg systexit after"
)
if
(isMockFingerptint()) {
NetlinkMacHandler::netlinkHandler_recmsg(tracee);
}
break
;
}
case SC_recv:
case SC_recvfrom: {
/
/
LOGE(
"start handle SC_recvfrom systexit after"
)
/
/
recv底层走的recvfrom,所以不需要处理recvfrom
if
(isMockFingerptint()) {
NetlinkMacHandler::netlinkHandler_recv(tracee);
}
break
;
}
/
sys
/
class
/
net
/
wlan0
/
address
/
sys
/
devices
/
virtual
/
net
/
wlan0
/
address
...
/
sys
/
class
/
net
/
wlan0
/
address
/
sys
/
devices
/
virtual
/
net
/
wlan0
/
address
...
popen(
"ip neigh show"
,
"r"
);
popen(
"ip neigh show"
,
"r"
);
/
proc
/
net
/
arp
static void _getifaddrs_callback(void
*
context, nlmsghdr
*
hdr) {
auto
*
*
out
=
reinterpret_cast<ifaddrs
*
*
>(context);
/
/
首先先判断消息类型是不是RTM_NEWLINK类型
if
(hdr
-
>nlmsg_type
=
=
RTM_NEWLINK) {
auto
*
ifi
=
reinterpret_cast<ifinfomsg
*
>(NLMSG_DATA(hdr));
ifaddrs_storage new_addr(out);
new_addr.interface_index
=
ifi
-
>ifi_index;
new_addr.ifa.ifa_flags
=
ifi
-
>ifi_flags;
/
/
Get the interface name
char ifname[IFNAMSIZ];
if_indextoname(ifi
-
>ifi_index, ifname);
/
/
Go through the various bits of information
and
find the name.
rtattr
*
rta
=
IFLA_RTA(ifi);
/
/
获取这个消息的长度
size_t rta_len
=
IFLA_PAYLOAD(hdr);
/
/
这块是判断这个消息是否是合格的消息
while
(RTA_OK(rta, rta_len)) {
if
(rta
-
>rta_type
=
=
IFLA_ADDRESS){
if
(RTA_PAYLOAD(rta) < sizeof(new_addr.addr)) {
void
*
data
=
RTA_DATA(rta);
/
/
修改mac地址
setMacInData(data, ifname, ZHENXI_RUNTIME_NETLINK_MAC, false);
new_addr.SetAddress(AF_PACKET, data, RTA_PAYLOAD(rta));
new_addr.SetPacketAttributes(ifi
-
>ifi_index, ifi
-
>ifi_type,
RTA_PAYLOAD(rta));
}
}
else
if
(rta
-
>rta_type
=
=
IFLA_BROADCAST) {
if
(RTA_PAYLOAD(rta) < sizeof(new_addr.ifa_ifu)) {
void
*
data
=
RTA_DATA(rta);
size_t byteCount
=
RTA_PAYLOAD(rta);
new_addr.SetBroadcastAddress(AF_PACKET, data, byteCount);
new_addr.SetPacketAttributes(ifi
-
>ifi_index, ifi
-
>ifi_type,
RTA_PAYLOAD(rta));
}
}
else
if
(rta
-
>rta_type
=
=
IFLA_IFNAME) {
if
(RTA_PAYLOAD(rta) < sizeof(new_addr.name)) {
memcpy(new_addr.name, RTA_DATA(rta), RTA_PAYLOAD(rta));
new_addr.ifa.ifa_name
=
new_addr.name;
}
}
rta
=
RTA_NEXT(rta, rta_len);
}
}
else
if
(hdr
-
>nlmsg_type
=
=
RTM_NEWADDR) {
/
/
这个类型在获取网卡的时候未发现调用
auto
*
msg
=
reinterpret_cast<ifaddrmsg
*
>(NLMSG_DATA(hdr));
/
/
We should already know about this
from
an RTM_NEWLINK message.
const auto
*
addr
=
reinterpret_cast<const ifaddrs_storage
*
>(
*
out);
while
(addr !
=
nullptr && addr
-
>interface_index !
=
static_cast<
int
>(msg
-
>ifa_index)) {
/
/
LOGE(
"Current interface index: %d"
, addr
-
>interface_index);
/
/
添加当前接口索引日志
addr
=
reinterpret_cast<const ifaddrs_storage
*
>(addr
-
>ifa.ifa_next);
}
/
/
If this
is
an unknown interface,
/
/
ignore whatever we're being told about it.
if
(addr
=
=
nullptr) {
/
/
LOGE (
"_getifaddrs_callback RTM_NEWADDR return"
)
return
;
}
ifaddrs_storage new_addr(out);
strcpy(new_addr.name, addr
-
>name);
new_addr.ifa.ifa_name
=
new_addr.name;
new_addr.ifa.ifa_flags
=
addr
-
>ifa.ifa_flags;
new_addr.interface_index
=
addr
-
>interface_index;
/
/
Go through the various bits of information
and
find the address
/
/
and
any
broadcast
/
destination address.
rtattr
*
rta
=
IFA_RTA(msg);
size_t rta_len
=
IFA_PAYLOAD(hdr);
while
(RTA_OK(rta, rta_len)) {
LOGE(
"RTA type: %d"
, rta
-
>rta_type);
if
(rta
-
>rta_type
=
=
IFA_ADDRESS) {
/
/
LOGE (
"_getifaddrs_callback RTM_NEWADDR IFA_ADDRESS %d "
,msg
-
>ifa_family)
if
(msg
-
>ifa_family
=
=
AF_INET || msg
-
>ifa_family
=
=
AF_INET6) {
void
*
data
=
RTA_DATA(rta);
/
/
确保 RTA_DATA(rta) 的大小是正确的
if
(msg
-
>ifa_family
=
=
AF_INET6 && RTA_PAYLOAD(rta) < sizeof(struct in6_addr)) {
LOGE(
"RTA_PAYLOAD size is less than sizeof(struct in6_addr)"
);
return
;
}
struct in6_addr addr_v6_address{};
memcpy(&addr_v6_address, RTA_DATA(rta), sizeof(struct in6_addr));
char
str
[INET6_ADDRSTRLEN];
inet_ntop(AF_INET6, &addr_v6_address,
str
, sizeof(
str
));
LOGE(
"RTM_NEWADDR&IFA_ADDRESS&AF_INET6 111 %s"
,
str
)
size_t byteCount
=
RTA_PAYLOAD(rta);
LOGE (
"RTM_NEWADDR&IFA_ADDRESS %zu %s "
,
byteCount, getpData(data, byteCount).c_str())
new_addr.SetAddress(msg
-
>ifa_family, data, byteCount);
new_addr.SetNetmask(msg
-
>ifa_family, msg
-
>ifa_prefixlen);
}
}
else
if
(rta
-
>rta_type
=
=
IFA_BROADCAST) {
if
(msg
-
>ifa_family
=
=
AF_INET||msg
-
>ifa_family
=
=
AF_INET6) {
void
*
data
=
RTA_DATA(rta);
size_t byteCount
=
RTA_PAYLOAD(rta);
LOGE (
"RTM_NEWADDR&IFA_BROADCAST %zu %s "
,
byteCount, getpData(data, byteCount).c_str())
new_addr.SetBroadcastAddress(msg
-
>ifa_family, data,
byteCount);
}
}
else
if
(rta
-
>rta_type
=
=
IFA_LOCAL) {
/
/
LOGE (
"_getifaddrs_callback RTM_NEWADDR IFA_LOCAL %d "
,msg
-
>ifa_family)
if
(msg
-
>ifa_family
=
=
AF_INET || msg
-
>ifa_family
=
=
AF_INET6) {
void
*
data
=
RTA_DATA(rta);
struct in6_addr addr_v6_local{};
memcpy(&addr_v6_local, RTA_DATA(rta), sizeof(struct in6_addr));
char
str
[INET6_ADDRSTRLEN];
inet_ntop(AF_INET6, &addr_v6_local,
str
, sizeof(
str
));
LOGE(
"RTM_NEWADDR&IFA_ADDRESS&AF_INET6 222 %s"
,
str
)
size_t byteCount
=
RTA_PAYLOAD(rta);
LOGE (
"RTM_NEWADDR&IFA_LOCAL %zu %s "
,
byteCount, getpData(data, byteCount).c_str())
new_addr.SetLocalAddress(msg
-
>ifa_family, data, byteCount);
}
}
rta
=
RTA_NEXT(rta, rta_len);
}
}
else
if
(hdr
-
>nlmsg_type
=
=
RTM_NEWNEIGH) {
/
/
RTM_NEWNEIGH 类型消息为网上邻居(arp表),需要进行随机化
auto
*
ifinfo
=
reinterpret_cast<ndmsg
*
>(NLMSG_DATA(hdr));
rtattr
*
rta
=
NDA_RTA(ifinfo);
size_t rta_len
=
NDA_PAYLOAD(hdr);
int
if_index
=
ifinfo
-
>ndm_ifindex;
char if_name[IFNAMSIZ];
if_indextoname(if_index, if_name);
/
/
遍历具体的消息类型
while
(RTA_OK(rta, rta_len)) {
/
/
a neighbor cache n
/
w layer destination address
/
/
邻居缓存nw层目标地址,ip地址区分
32
和
64
/
/
ip地址,ip可以是v4也可以是v6
if
(rta
-
>rta_type
=
=
NDA_DST) {
if
(ifinfo
-
>ndm_family
=
=
AF_INET) {
/
/
32
struct in_addr addr{};
memcpy(&addr, RTA_DATA(rta), sizeof(struct in_addr));
char
*
ntoa
=
inet_ntoa(addr);
/
/
LOGE(
"NDA_DST&AF_INET %s"
, inet_ntoa(addr))
}
else
if
(ifinfo
-
>ndm_family
=
=
AF_INET6) {
/
/
64
struct in6_addr addr{};
memcpy(&addr, RTA_DATA(rta), sizeof(struct in6_addr));
char
str
[INET6_ADDRSTRLEN];
inet_ntop(AF_INET6, &addr,
str
, sizeof(
str
));
/
/
LOGE(
"NDA_DST&AF_INET6 %s"
,
str
);
}
}
else
if
(rta
-
>rta_type
=
=
NDA_LLADDR) {
/
/
网卡地址
auto
*
data
=
RTA_DATA(rta);
setMacInData(data, if_name, ZHENXI_RUNTIME_NETLINK_NEIGH, true);
}
rta
=
RTA_NEXT(rta, rta_len);
}
}
else
if
(hdr
-
>nlmsg_type
=
=
RTM_GETADDR) {
/
/
LOGE(
"RTM_GETADDR "
)
auto
*
ifa
=
reinterpret_cast<ifaddrmsg
*
>(NLMSG_DATA(hdr));
/
/
Get the interface name
char ifname[IFNAMSIZ];
if_indextoname(ifa
-
>ifa_index, ifname);
/
/
Process the attributes
rtattr
*
rta
=
IFA_RTA(ifa);
size_t rta_len
=
IFA_PAYLOAD(hdr);
while
(RTA_OK(rta, rta_len)) {
if
(rta
-
>rta_type
=
=
IFA_ADDRESS) {
if
(ifa
-
>ifa_family
=
=
AF_INET6) {
/
/
Ensure RTA_DATA(rta) size
is
correct
if
(RTA_PAYLOAD(rta) < sizeof(struct in6_addr)) {
LOGE(
"RTM_GETADDR RTA_PAYLOAD size is less than sizeof(struct in6_addr)"
);
return
;
}
struct in6_addr addr_v6_address{};
memcpy(&addr_v6_address, RTA_DATA(rta), sizeof(struct in6_addr));
char
str
[INET6_ADDRSTRLEN];
inet_ntop(AF_INET6, &addr_v6_address,
str
, sizeof(
str
));
LOGE(
"RTM_GETADDR RTM_GETADDR&IFA_ADDRESS&AF_INET6 %s"
,
str
);
}
}
rta
=
RTA_NEXT(rta, rta_len);
}
}
}
static void _getifaddrs_callback(void
*
context, nlmsghdr
*
hdr) {
auto
*
*
out
=
reinterpret_cast<ifaddrs
*
*
>(context);
/
/
首先先判断消息类型是不是RTM_NEWLINK类型
if
(hdr
-
>nlmsg_type
=
=
RTM_NEWLINK) {
auto
*
ifi
=
reinterpret_cast<ifinfomsg
*
>(NLMSG_DATA(hdr));
ifaddrs_storage new_addr(out);
new_addr.interface_index
=
ifi
-
>ifi_index;
new_addr.ifa.ifa_flags
=
ifi
-
>ifi_flags;
/
/
Get the interface name
char ifname[IFNAMSIZ];
if_indextoname(ifi
-
>ifi_index, ifname);
/
/
Go through the various bits of information
and
find the name.
rtattr
*
rta
=
IFLA_RTA(ifi);
/
/
获取这个消息的长度
size_t rta_len
=
IFLA_PAYLOAD(hdr);
/
/
这块是判断这个消息是否是合格的消息
while
(RTA_OK(rta, rta_len)) {
if
(rta
-
>rta_type
=
=
IFLA_ADDRESS){
if
(RTA_PAYLOAD(rta) < sizeof(new_addr.addr)) {
void
*
data
=
RTA_DATA(rta);
/
/
修改mac地址
setMacInData(data, ifname, ZHENXI_RUNTIME_NETLINK_MAC, false);
new_addr.SetAddress(AF_PACKET, data, RTA_PAYLOAD(rta));
new_addr.SetPacketAttributes(ifi
-
>ifi_index, ifi
-
>ifi_type,
RTA_PAYLOAD(rta));
}
}
else
if
(rta
-
>rta_type
=
=
IFLA_BROADCAST) {
if
(RTA_PAYLOAD(rta) < sizeof(new_addr.ifa_ifu)) {
void
*
data
=
RTA_DATA(rta);
size_t byteCount
=
RTA_PAYLOAD(rta);
new_addr.SetBroadcastAddress(AF_PACKET, data, byteCount);
new_addr.SetPacketAttributes(ifi
-
>ifi_index, ifi
-
>ifi_type,
RTA_PAYLOAD(rta));
}
}
else
if
(rta
-
>rta_type
=
=
IFLA_IFNAME) {
if
(RTA_PAYLOAD(rta) < sizeof(new_addr.name)) {
memcpy(new_addr.name, RTA_DATA(rta), RTA_PAYLOAD(rta));
new_addr.ifa.ifa_name
=
new_addr.name;
}
}
rta
=
RTA_NEXT(rta, rta_len);
}
}
else
if
(hdr
-
>nlmsg_type
=
=
RTM_NEWADDR) {
/
/
这个类型在获取网卡的时候未发现调用
auto
*
msg
=
reinterpret_cast<ifaddrmsg
*
>(NLMSG_DATA(hdr));
/
/
We should already know about this
from
an RTM_NEWLINK message.
const auto
*
addr
=
reinterpret_cast<const ifaddrs_storage
*
>(
*
out);
while
(addr !
=
nullptr && addr
-
>interface_index !
=
static_cast<
int
>(msg
-
>ifa_index)) {
/
/
LOGE(
"Current interface index: %d"
, addr
-
>interface_index);
/
/
添加当前接口索引日志
addr
=
reinterpret_cast<const ifaddrs_storage
*
>(addr
-
>ifa.ifa_next);
}
/
/
If this
is
an unknown interface,
/
/
ignore whatever we're being told about it.
if
(addr
=
=
nullptr) {
/
/
LOGE (
"_getifaddrs_callback RTM_NEWADDR return"
)
return
;
}
ifaddrs_storage new_addr(out);
strcpy(new_addr.name, addr
-
>name);
new_addr.ifa.ifa_name
=
new_addr.name;
new_addr.ifa.ifa_flags
=
addr
-
>ifa.ifa_flags;
new_addr.interface_index
=
addr
-
>interface_index;
/
/
Go through the various bits of information
and
find the address
/
/
and
any
broadcast
/
destination address.
rtattr
*
rta
=
IFA_RTA(msg);
size_t rta_len
=
IFA_PAYLOAD(hdr);
while
(RTA_OK(rta, rta_len)) {
LOGE(
"RTA type: %d"
, rta
-
>rta_type);
if
(rta
-
>rta_type
=
=
IFA_ADDRESS) {
/
/
LOGE (
"_getifaddrs_callback RTM_NEWADDR IFA_ADDRESS %d "
,msg
-
>ifa_family)
if
(msg
-
>ifa_family
=
=
AF_INET || msg
-
>ifa_family
=
=
AF_INET6) {
void
*
data
=
RTA_DATA(rta);
/
/
确保 RTA_DATA(rta) 的大小是正确的
if
(msg
-
>ifa_family
=
=
AF_INET6 && RTA_PAYLOAD(rta) < sizeof(struct in6_addr)) {
LOGE(
"RTA_PAYLOAD size is less than sizeof(struct in6_addr)"
);
return
;
}
struct in6_addr addr_v6_address{};
memcpy(&addr_v6_address, RTA_DATA(rta), sizeof(struct in6_addr));
char
str
[INET6_ADDRSTRLEN];
inet_ntop(AF_INET6, &addr_v6_address,
str
, sizeof(
str
));
LOGE(
"RTM_NEWADDR&IFA_ADDRESS&AF_INET6 111 %s"
,
str
)
size_t byteCount
=
RTA_PAYLOAD(rta);
LOGE (
"RTM_NEWADDR&IFA_ADDRESS %zu %s "
,
byteCount, getpData(data, byteCount).c_str())
new_addr.SetAddress(msg
-
>ifa_family, data, byteCount);
new_addr.SetNetmask(msg
-
>ifa_family, msg
-
>ifa_prefixlen);
}
}
else
if
(rta
-
>rta_type
=
=
IFA_BROADCAST) {
if
(msg
-
>ifa_family
=
=
AF_INET||msg
-
>ifa_family
=
=
AF_INET6) {
void
*
data
=
RTA_DATA(rta);
size_t byteCount
=
RTA_PAYLOAD(rta);
LOGE (
"RTM_NEWADDR&IFA_BROADCAST %zu %s "
,
byteCount, getpData(data, byteCount).c_str())
new_addr.SetBroadcastAddress(msg
-
>ifa_family, data,
byteCount);
}
}
else
if
(rta
-
>rta_type
=
=
IFA_LOCAL) {
/
/
LOGE (
"_getifaddrs_callback RTM_NEWADDR IFA_LOCAL %d "
,msg
-
>ifa_family)
if
(msg
-
>ifa_family
=
=
AF_INET || msg
-
>ifa_family
=
=
AF_INET6) {
void
*
data
=
RTA_DATA(rta);
struct in6_addr addr_v6_local{};
memcpy(&addr_v6_local, RTA_DATA(rta), sizeof(struct in6_addr));
char
str
[INET6_ADDRSTRLEN];
inet_ntop(AF_INET6, &addr_v6_local,
str
, sizeof(
str
));
LOGE(
"RTM_NEWADDR&IFA_ADDRESS&AF_INET6 222 %s"
,
str
)
size_t byteCount
=
RTA_PAYLOAD(rta);
LOGE (
"RTM_NEWADDR&IFA_LOCAL %zu %s "
,
byteCount, getpData(data, byteCount).c_str())
new_addr.SetLocalAddress(msg
-
>ifa_family, data, byteCount);
}
}
rta
=
RTA_NEXT(rta, rta_len);
}
}
else
if
(hdr
-
>nlmsg_type
=
=
RTM_NEWNEIGH) {
/
/
RTM_NEWNEIGH 类型消息为网上邻居(arp表),需要进行随机化
auto
*
ifinfo
=
reinterpret_cast<ndmsg
*
>(NLMSG_DATA(hdr));
rtattr
*
rta
=
NDA_RTA(ifinfo);
size_t rta_len
=
NDA_PAYLOAD(hdr);
int
if_index
=
ifinfo
-
>ndm_ifindex;
char if_name[IFNAMSIZ];
if_indextoname(if_index, if_name);
/
/
遍历具体的消息类型
while
(RTA_OK(rta, rta_len)) {
/
/
a neighbor cache n
/
w layer destination address
/
/
邻居缓存nw层目标地址,ip地址区分
32
和
64
/
/
ip地址,ip可以是v4也可以是v6
if
(rta
-
>rta_type
=
=
NDA_DST) {
if
(ifinfo
-
>ndm_family
=
=
AF_INET) {
/
/
32
struct in_addr addr{};
memcpy(&addr, RTA_DATA(rta), sizeof(struct in_addr));
char
*
ntoa
=
inet_ntoa(addr);
/
/
LOGE(
"NDA_DST&AF_INET %s"
, inet_ntoa(addr))
}
else
if
(ifinfo
-
>ndm_family
=
=
AF_INET6) {
/
/
64
struct in6_addr addr{};
memcpy(&addr, RTA_DATA(rta), sizeof(struct in6_addr));
char
str
[INET6_ADDRSTRLEN];
inet_ntop(AF_INET6, &addr,
str
, sizeof(
str
));
/
/
LOGE(
"NDA_DST&AF_INET6 %s"
,
str
);
}
}
else
if
(rta
-
>rta_type
=
=
NDA_LLADDR) {
/
/
网卡地址
auto
*
data
=
RTA_DATA(rta);
setMacInData(data, if_name, ZHENXI_RUNTIME_NETLINK_NEIGH, true);
}
rta
=
RTA_NEXT(rta, rta_len);
}
}
else
if
(hdr
-
>nlmsg_type
=
=
RTM_GETADDR) {
/
/
LOGE(
"RTM_GETADDR "
)
auto
*
ifa
=
reinterpret_cast<ifaddrmsg
*
>(NLMSG_DATA(hdr));
/
/
Get the interface name
char ifname[IFNAMSIZ];
if_indextoname(ifa
-
>ifa_index, ifname);
/
/
Process the attributes
rtattr
*
rta
=
IFA_RTA(ifa);
size_t rta_len
=
IFA_PAYLOAD(hdr);
while
(RTA_OK(rta, rta_len)) {
if
(rta
-
>rta_type
=
=
IFA_ADDRESS) {
if
(ifa
-
>ifa_family
=
=
AF_INET6) {
/
/
Ensure RTA_DATA(rta) size
is
correct
if
(RTA_PAYLOAD(rta) < sizeof(struct in6_addr)) {
LOGE(
"RTM_GETADDR RTA_PAYLOAD size is less than sizeof(struct in6_addr)"
);
return
;
}
struct in6_addr addr_v6_address{};
memcpy(&addr_v6_address, RTA_DATA(rta), sizeof(struct in6_addr));
char
str
[INET6_ADDRSTRLEN];
inet_ntop(AF_INET6, &addr_v6_address,
str
, sizeof(
str
));
LOGE(
"RTM_GETADDR RTM_GETADDR&IFA_ADDRESS&AF_INET6 %s"
,
str
);
}
}
rta
=
RTA_NEXT(rta, rta_len);
}
}
}
try
{
NetworkInterface networkInterface;
InetAddress inetAddress;
for
(Enumeration<NetworkInterface> en
=
NetworkInterface.getNetworkInterfaces(); en.hasMoreElements(); ) {
networkInterface
=
en.nextElement();
for
(Enumeration<InetAddress> enumIpAddr
=
networkInterface.getInetAddresses(); enumIpAddr.hasMoreElements(); ) {
inetAddress
=
enumIpAddr.nextElement();
if
(inetAddress instanceof Inet6Address) {
CLog.e(
"Java 获取 ipv6 "
+
inetAddress.getHostAddress());
}
}
}
} catch (Throwable ex) {
CLog.e(
"printf ipv6 info error "
+
ex);
}
try
{
NetworkInterface networkInterface;
InetAddress inetAddress;
for
(Enumeration<NetworkInterface> en
=
NetworkInterface.getNetworkInterfaces(); en.hasMoreElements(); ) {
networkInterface
=
en.nextElement();
for
(Enumeration<InetAddress> enumIpAddr
=
networkInterface.getInetAddresses(); enumIpAddr.hasMoreElements(); ) {
inetAddress
=
enumIpAddr.nextElement();
if
(inetAddress instanceof Inet6Address) {
CLog.e(
"Java 获取 ipv6 "
+
inetAddress.getHostAddress());
}
}
}
} catch (Throwable ex) {
CLog.e(
"printf ipv6 info error "
+
ex);
}
ip
-
6
addr show
1
: lo: <LOOPBACK,UP,LOWER_UP> mtu
65536
state UNKNOWN qlen
1000
inet6 ::
1
/
128
scope host
valid_lft forever preferred_lft forever
3
: dummy0: <BROADCAST,NOARP,UP,LOWER_UP> mtu
1500
state UNKNOWN qlen
1000
inet6 fe80::b86c:
79ff
:fe96:
4945
/
64
scope link
valid_lft forever preferred_lft forever
10
: rmnet_data0@rmnet_ipa0: <UP,LOWER_UP> mtu
1500
state UNKNOWN qlen
1000
inet6 fe80::
2ad1
:b5a0:
792b
:
9ec4
/
64
scope link
valid_lft forever preferred_lft forever
30
: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu
1500
state UP qlen
3000
inet6 fe80::
8670
:a04c:b8cf:
467c
/
64
scope link stable
-
privacy
valid_lft forever preferred_lft forever
1
: lo: <LOOPBACK,UP,LOWER_UP> mtu
65536
state UNKNOWN qlen
1000
inet6 ::
1
/
128
scope host
valid_lft forever preferred_lft forever
3
: dummy0: <BROADCAST,NOARP,UP,LOWER_UP> mtu
1500
state UNKNOWN qlen
1000
inet6 fe80::b86c:
79ff
:fe96:
4945
/
64
scope link
valid_lft forever preferred_lft forever
10
: rmnet_data0@rmnet_ipa0: <UP,LOWER_UP> mtu
1500
state UNKNOWN qlen
1000
inet6 fe80::
2ad1
:b5a0:
792b
:
9ec4
/
64
scope link
valid_lft forever preferred_lft forever
30
: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu
1500
state UP qlen
3000
inet6 fe80::
8670
:a04c:b8cf:
467c
/
64
scope link stable
-
privacy
valid_lft forever preferred_lft forever
uname
-
a
const char
*
path
=
getApkPath(env, context);
/
/
check svc apk sign
const string &string
=
checkSign(env, path).substr(
0
,
10
);
LOG(INFO) <<
"apk sign "
<< string;
if
(string
=
=
Base64Utils::VTDecode(
"TFtCRU58UERAUQ=="
)) {
/
/
check sign success,but maybe svc io hook
/
/
check apk path
int
fd
=
my_openat(AT_FDCWD, reinterpret_cast<const char
*
>(path),
O_RDONLY | O_CLOEXEC,
0640
);
/
/
check apk path
char buff[PATH_MAX]
=
{
0
};
std::string fdPath(
"/proc/"
);
fdPath.append(to_string(getpid())).append(
"/fd/"
).append(to_string(fd));
long
len
=
raw_syscall(__NR_readlinkat, AT_FDCWD, fdPath.c_str(), buff, PATH_MAX);
if
(
len
<
0
) {
return
getItemData(env,
"APK签名验证失败"
,
"readlinkat error"
, true,
RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
/
/
截断,如果攻击者hook了readlinkat,只修改了参数,没修改返回值也可以检测出来。
buff[
len
]
=
'\0'
;
LOG(INFO) <<
"check apk sign path "
<< buff;
if
(my_strcmp(path, buff)
=
=
0
) {
LOG(INFO) <<
"check apk sign path success "
;
/
/
start check memory&location inode
struct stat statBuff
=
{
0
};
long
stat
=
raw_syscall(__NR_fstat, fd, &statBuff);
if
(stat <
0
) {
LOG(ERROR) <<
"check apk sign path fail __NR_fstat<0"
;
return
getItemData(env,
"APK签名验证失败"
,
"fstat error"
, true, RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
/
/
check uid&gid (
1000
=
system group)
if
(statBuff.st_uid !
=
1000
&& statBuff.st_gid !
=
1000
) {
LOG(ERROR) <<
"check apk sign gid&uid fail "
;
return
getItemData(env,
"APK签名验证失败"
,
nullptr, true, RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
size_t inode
=
getFileInMapsInode(path);
if
(statBuff.st_ino !
=
inode) {
LOG(ERROR) <<
"check apk sign inode fail "
<<statBuff.st_ino<<
" maps ->"
<<inode;
return
getItemData(env,
"APK签名验证失败"
,
nullptr, true, RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
LOG(ERROR) <<
">>>>>>>>>> check apk sign success! uid-> "
<< statBuff.st_uid
<<
" gid-> "
<< statBuff.st_gid;
}
else
{
LOG(ERROR) <<
"check apk sign path fail "
;
return
getItemData(env,
"APK签名验证失败"
,
nullptr, true, RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
LOG(INFO) <<
"check apk sign success"
;
return
nullptr;
}
const char
*
path
=
getApkPath(env, context);
/
/
check svc apk sign
const string &string
=
checkSign(env, path).substr(
0
,
10
);
LOG(INFO) <<
"apk sign "
<< string;
if
(string
=
=
Base64Utils::VTDecode(
"TFtCRU58UERAUQ=="
)) {
/
/
check sign success,but maybe svc io hook
/
/
check apk path
int
fd
=
my_openat(AT_FDCWD, reinterpret_cast<const char
*
>(path),
O_RDONLY | O_CLOEXEC,
0640
);
/
/
check apk path
char buff[PATH_MAX]
=
{
0
};
std::string fdPath(
"/proc/"
);
fdPath.append(to_string(getpid())).append(
"/fd/"
).append(to_string(fd));
long
len
=
raw_syscall(__NR_readlinkat, AT_FDCWD, fdPath.c_str(), buff, PATH_MAX);
if
(
len
<
0
) {
return
getItemData(env,
"APK签名验证失败"
,
"readlinkat error"
, true,
RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
/
/
截断,如果攻击者hook了readlinkat,只修改了参数,没修改返回值也可以检测出来。
buff[
len
]
=
'\0'
;
LOG(INFO) <<
"check apk sign path "
<< buff;
if
(my_strcmp(path, buff)
=
=
0
) {
LOG(INFO) <<
"check apk sign path success "
;
/
/
start check memory&location inode
struct stat statBuff
=
{
0
};
long
stat
=
raw_syscall(__NR_fstat, fd, &statBuff);
if
(stat <
0
) {
LOG(ERROR) <<
"check apk sign path fail __NR_fstat<0"
;
return
getItemData(env,
"APK签名验证失败"
,
"fstat error"
, true, RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
/
/
check uid&gid (
1000
=
system group)
if
(statBuff.st_uid !
=
1000
&& statBuff.st_gid !
=
1000
) {
LOG(ERROR) <<
"check apk sign gid&uid fail "
;
return
getItemData(env,
"APK签名验证失败"
,
nullptr, true, RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
size_t inode
=
getFileInMapsInode(path);
if
(statBuff.st_ino !
=
inode) {
LOG(ERROR) <<
"check apk sign inode fail "
<<statBuff.st_ino<<
" maps ->"
<<inode;
return
getItemData(env,
"APK签名验证失败"
,
nullptr, true, RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
LOG(ERROR) <<
">>>>>>>>>> check apk sign success! uid-> "
<< statBuff.st_uid
<<
" gid-> "
<< statBuff.st_gid;
}
else
{
LOG(ERROR) <<
"check apk sign path fail "
;
return
getItemData(env,
"APK签名验证失败"
,
nullptr, true, RISK_LEAVE_DEADLY, TAG_REPACKAGE);
}
LOG(INFO) <<
"check apk sign success"
;
return
nullptr;
}
try
{
Field creatorField
=
PackageInfo.
class
.getField(
"CREATOR"
);
creatorField.setAccessible(true);
Object
creator
=
creatorField.get(null);
if
(creator !
=
null) {
ClassLoader creatorClassloader
=
creator.getClass().getClassLoader();
ClassLoader sysClassloader
=
ClassLoader.getSystemClassLoader();
if
(creatorClassloader
=
=
null || sysClassloader
=
=
null) {
return
null;
}
/
/
系统的是bootclassloader
/
/
用户创建的都是pathclassloader
/
/
如果相等则认为系统的被替换
if
(sysClassloader.getClass().getName().
equals(creatorClassloader.getClass().getName())) {
return
new ListItemBean(
"Apk签名验证失败!"
,
ListItemBean.RiskLeave.Deadly,
"Apk签名方法被替换!\n"
+
creatorClassloader.getClass().getName()
+
"\n"
+
sysClassloader.getClass().getName());
}
return
null;
}
} catch (Throwable e) {
CLog.e(
"checkApkPackageInfoCreator error "
+
e);
}
try
{
Field creatorField
=
PackageInfo.
class
.getField(
"CREATOR"
);
creatorField.setAccessible(true);
Object
creator
=
creatorField.get(null);
if
(creator !
=
null) {
ClassLoader creatorClassloader
=
creator.getClass().getClassLoader();
ClassLoader sysClassloader
=
ClassLoader.getSystemClassLoader();
if
(creatorClassloader
=
=
null || sysClassloader
=
=
null) {
return
null;
}
/
/
系统的是bootclassloader
/
/
用户创建的都是pathclassloader
/
/
如果相等则认为系统的被替换
if
(sysClassloader.getClass().getName().
equals(creatorClassloader.getClass().getName())) {
return
new ListItemBean(
"Apk签名验证失败!"
,
ListItemBean.RiskLeave.Deadly,
"Apk签名方法被替换!\n"
+
creatorClassloader.getClass().getName()
+
"\n"
+
sysClassloader.getClass().getName());
}
return
null;
}
} catch (Throwable e) {
CLog.e(
"checkApkPackageInfoCreator error "
+
e);
}
private static void hookPackageParser(Signature[] fakeSignature) {
try
{
RposedBridge.hookAllMethods(
RposedHelpers.findClass(
"android.content.pm.PackageParser"
, ClassLoader.getSystemClassLoader()),
"generatePackageInfo"
, new RC_MethodHook() {
@Override
protected void afterHookedMethod(MethodHookParam param) {
PackageInfo packageInfo
=
(PackageInfo) param.getResult();
if
(packageInfo
=
=
null)
return
;
if
(packageInfo.packageName.equals(RuntimeToolKit.packageName)) {
if
(packageInfo.signatures !
=
null && packageInfo.signatures.length >
0
) {
CLog.i(
"PackageParser signature info (method 1)"
);
packageInfo.signatures[
0
]
=
fakeSignature[
0
];
}
if
(Build.VERSION.SDK_INT >
=
Build.VERSION_CODES.P) {
if
(packageInfo.signingInfo !
=
null) {
CLog.i(
"PackageParser signature info (method 2)"
);
Signature[] signaturesArray
=
packageInfo.signingInfo.getApkContentsSigners();
if
(signaturesArray !
=
null && signaturesArray.length >
0
) {
signaturesArray[
0
]
=
fakeSignature[
0
];
}
}
}
}
}
});
} catch (Throwable e) {
CLog.e(
"hook apkSign PackageParser -> generatePackageInfo "
+
e.getMessage());
}
}
private static void hookPackageParser(Signature[] fakeSignature) {
try
{
RposedBridge.hookAllMethods(
RposedHelpers.findClass(
"android.content.pm.PackageParser"
, ClassLoader.getSystemClassLoader()),
"generatePackageInfo"
, new RC_MethodHook() {
@Override
protected void afterHookedMethod(MethodHookParam param) {
PackageInfo packageInfo
=
(PackageInfo) param.getResult();
if
(packageInfo
=
=
null)
return
;
if
(packageInfo.packageName.equals(RuntimeToolKit.packageName)) {
if
(packageInfo.signatures !
=
null && packageInfo.signatures.length >
0
) {
CLog.i(
"PackageParser signature info (method 1)"
);
packageInfo.signatures[
0
]
=
fakeSignature[
0
];
}
if
(Build.VERSION.SDK_INT >
=
Build.VERSION_CODES.P) {
if
(packageInfo.signingInfo !
=
null) {
CLog.i(
"PackageParser signature info (method 2)"
);
Signature[] signaturesArray
=
packageInfo.signingInfo.getApkContentsSigners();
if
(signaturesArray !
=
null && signaturesArray.length >
0
) {
signaturesArray[
0
]
=
fakeSignature[
0
];
}
}
}
}
}
});
} catch (Throwable e) {
CLog.e(
"hook apkSign PackageParser -> generatePackageInfo "
+
e.getMessage());
}
}
public static void byPassSignatureForCREATOR(Signature[] fakeSignature) {
if
(fakeSignature
=
=
null) {
return
;
}
Parcelable.Creator<PackageInfo> originalCreator
=
PackageInfo.CREATOR;
Parcelable.Creator<PackageInfo> proxiedCreator
=
new Parcelable.Creator<PackageInfo>() {
@Override
public PackageInfo createFromParcel(Parcel source) {
PackageInfo packageInfo
=
originalCreator.createFromParcel(source);
if
(packageInfo.packageName.equals(RuntimeToolKit.packageName)) {
if
(packageInfo.signatures !
=
null && packageInfo.signatures.length >
0
) {
/
/
CLog.i(
"CREATOR Replace signature info (method 1)"
);
packageInfo.signatures[
0
]
=
fakeSignature[
0
];
}
if
(Build.VERSION.SDK_INT >
=
Build.VERSION_CODES.P) {
if
(packageInfo.signingInfo !
=
null) {
/
/
CLog.i(
"CREATOR Replace signature info (method 2)"
);
Signature[] signaturesArray
=
packageInfo.signingInfo.getApkContentsSigners();
if
(signaturesArray !
=
null && signaturesArray.length >
0
) {
signaturesArray[
0
]
=
fakeSignature[
0
];
}
}
}
}
return
packageInfo;
}
@Override
public PackageInfo[] newArray(
int
size) {
return
originalCreator.newArray(size);
}
};
RposedHelpers.setStaticObjectField(PackageInfo.
class
,
"CREATOR"
, proxiedCreator);
try
{
Map
<?, ?> mCreators
=
(
Map
<?, ?>) RposedHelpers.getStaticObjectField(Parcel.
class
,
"mCreators"
);
mCreators.clear();
} catch (NoSuchFieldError ignore) {
} catch (Throwable e) {
CLog.e(
"fail to clear Parcel.mCreators"
, e);
}
try
{
Map
<?, ?> sPairedCreators
=
(
Map
<?, ?>)
RposedHelpers.getStaticObjectField(Parcel.
class
,
"sPairedCreators"
);
sPairedCreators.clear();
} catch (NoSuchFieldError ignore) {
} catch (Throwable e) {
CLog.e(
"fail to clear Parcel.sPairedCreators"
, e);
}
}
public static void byPassSignatureForCREATOR(Signature[] fakeSignature) {
if
(fakeSignature
=
=
null) {
return
;
}
Parcelable.Creator<PackageInfo> originalCreator
=
PackageInfo.CREATOR;
Parcelable.Creator<PackageInfo> proxiedCreator
=
new Parcelable.Creator<PackageInfo>() {
@Override
public PackageInfo createFromParcel(Parcel source) {
PackageInfo packageInfo
=
originalCreator.createFromParcel(source);
if
(packageInfo.packageName.equals(RuntimeToolKit.packageName)) {
if
(packageInfo.signatures !
=
null && packageInfo.signatures.length >
0
) {
/
/
CLog.i(
"CREATOR Replace signature info (method 1)"
);
packageInfo.signatures[
0
]
=
fakeSignature[
0
];
}
if
(Build.VERSION.SDK_INT >
=
Build.VERSION_CODES.P) {
if
(packageInfo.signingInfo !
=
null) {
/
/
CLog.i(
"CREATOR Replace signature info (method 2)"
);
Signature[] signaturesArray
=
packageInfo.signingInfo.getApkContentsSigners();
if
(signaturesArray !
=
null && signaturesArray.length >
0
) {
signaturesArray[
0
]
=
fakeSignature[
0
];
}
}
}
}
return
packageInfo;
}
@Override
public PackageInfo[] newArray(
int
size) {
return
originalCreator.newArray(size);
}
};
RposedHelpers.setStaticObjectField(PackageInfo.
class
,
"CREATOR"
, proxiedCreator);
try
{
Map
<?, ?> mCreators
=
(
Map
<?, ?>) RposedHelpers.getStaticObjectField(Parcel.
class
,
"mCreators"
);
mCreators.clear();
} catch (NoSuchFieldError ignore) {
} catch (Throwable e) {
CLog.e(
"fail to clear Parcel.mCreators"
, e);
}
try
{
Map
<?, ?> sPairedCreators
=
(
Map
<?, ?>)
RposedHelpers.getStaticObjectField(Parcel.
class
,
"sPairedCreators"
);
sPairedCreators.clear();
} catch (NoSuchFieldError ignore) {
} catch (Throwable e) {
CLog.e(
"fail to clear Parcel.sPairedCreators"
, e);
}
}
RposedHelpers.findAndHookMethod(
"android.os.BinderProxy"
,
context.getClassLoader(),
"transact"
,
int
.
class
,
Parcel.
class
,
Parcel.
class
,
int
.
class
,
new RC_MethodHook() {
@Override
protected void afterHookedMethod(MethodHookParam param) {
try
{
Object
object
=
param.thisObject;
int
id
=
(
int
) param.args[
0
];
Parcel write
=
(Parcel) param.args[
1
];
Parcel out
=
(Parcel) param.args[
2
];
/
/
forward check
if
(write
=
=
null || out
=
=
null) {
return
;
}
/
/
prevent recurise call (防止递归)
if
(
id
=
=
IBinder.INTERFACE_TRANSACTION) {
/
/
IBinder协议事务代码:询问事务的收件人端以获取其规范接口描述符。
return
;
}
String desc
=
(String) RposedHelpers.callMethod(
object
,
"getInterfaceDescriptor"
);
if
(desc
=
=
null || !desc.equals(
"android.content.pm.IPackageManager"
)) {
return
;
}
if
(
id
=
=
TRANSACTION_getPackageInfo_ID) {
out.readException();
if
(
0
!
=
out.readInt()) {
PackageInfo packageInfo
=
PackageInfo.CREATOR.createFromParcel(out);
if
(packageInfo.packageName.equals(context.getApplicationInfo().packageName)) {
if
(fakeSignature[
0
]
=
=
null) {
CLog.e(
">>>>>>>>>> byPassSignature fakeSignature == null"
);
System.exit(
0
);
return
;
}
/
/
CLog.i(
"org data size -> "
+
out.dataSize());
if
(packageInfo.signatures !
=
null && packageInfo.signatures.length >
0
) {
packageInfo.signatures[
0
]
=
fakeSignature[
0
];
/
/
CLog.i(
" byPassSignatureByLSPosed 1 !!"
);
}
if
(Build.VERSION.SDK_INT >
=
Build.VERSION_CODES.P) {
if
(packageInfo.signingInfo !
=
null) {
Signature[] signaturesArray
=
packageInfo.signingInfo.getApkContentsSigners();
if
(signaturesArray !
=
null && signaturesArray.length >
0
) {
signaturesArray[
0
]
=
fakeSignature[
0
];
/
/
CLog.i(
" byPassSignatureByLSPosed 2 !!"
);
}
}
}
out.setDataPosition(
0
);
out.setDataSize(
0
);
out.writeNoException();
out.writeInt(
1
);
packageInfo.writeToParcel(out, PARCELABLE_WRITE_RETURN_VALUE);
}
}
/
/
reset pos
out.setDataPosition(
0
);
}
}
catch (Throwable err) {
CLog.e(
">>>>>>>>>> byPassSignatureByLSPosed error "
+
err.getMessage());
}
}
});
RposedHelpers.findAndHookMethod(
"android.os.BinderProxy"
,
context.getClassLoader(),
"transact"
,
int
.
class
,
Parcel.
class
,
Parcel.
class
,
int
.
class
,
new RC_MethodHook() {
@Override
protected void afterHookedMethod(MethodHookParam param) {
try
{
Object
object
=
param.thisObject;
int
id
=
(
int
) param.args[
0
];
Parcel write
=
(Parcel) param.args[
1
];
Parcel out
=
(Parcel) param.args[
2
];
/
/
forward check
if
(write
=
=
null || out
=
=
null) {
return
;
}
/
/
prevent recurise call (防止递归)
if
(
id
=
=
IBinder.INTERFACE_TRANSACTION) {
/
/
IBinder协议事务代码:询问事务的收件人端以获取其规范接口描述符。
return
;
}
String desc
=
(String) RposedHelpers.callMethod(
object
,
"getInterfaceDescriptor"
);
if
(desc
=
=
null || !desc.equals(
"android.content.pm.IPackageManager"
)) {
return
;
}
if
(
id
=
=
TRANSACTION_getPackageInfo_ID) {
out.readException();
if
(
0
!
=
out.readInt()) {
PackageInfo packageInfo
=
PackageInfo.CREATOR.createFromParcel(out);
if
(packageInfo.packageName.equals(context.getApplicationInfo().packageName)) {
if
(fakeSignature[
0
]
=
=
null) {
CLog.e(
">>>>>>>>>> byPassSignature fakeSignature == null"
);
System.exit(
0
);
return
;
}
/
/
CLog.i(
"org data size -> "
+
out.dataSize());
if
(packageInfo.signatures !
=
null && packageInfo.signatures.length >
0
) {
packageInfo.signatures[
0
]
=
fakeSignature[
0
];
/
/
CLog.i(
" byPassSignatureByLSPosed 1 !!"
);
}
if
(Build.VERSION.SDK_INT >
=
Build.VERSION_CODES.P) {
if
(packageInfo.signingInfo !
=
null) {
Signature[] signaturesArray
=
packageInfo.signingInfo.getApkContentsSigners();
if
(signaturesArray !
=
null && signaturesArray.length >
0
) {
signaturesArray[
0
]
=
fakeSignature[
0
];
/
/
CLog.i(
" byPassSignatureByLSPosed 2 !!"
);
}
}
}
out.setDataPosition(
0
);
out.setDataSize(
0
);
out.writeNoException();
out.writeInt(
1
);
packageInfo.writeToParcel(out, PARCELABLE_WRITE_RETURN_VALUE);
}
}
/
/
reset pos
out.setDataPosition(
0
);
}
}
catch (Throwable err) {
CLog.e(
">>>>>>>>>> byPassSignatureByLSPosed error "
+
err.getMessage());
}
}
});
void install_check_arch_seccomp() {
struct sock_filter
filter
[
15
]
=
{
BPF_STMT(BPF_LD
+
BPF_W
+
BPF_ABS, (uint32_t) offsetof(struct seccomp_data, nr)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, __NR_getpid,
0
,
12
),
BPF_STMT(BPF_LD
+
BPF_W
+
BPF_ABS, (uint32_t) offsetof(struct seccomp_data, args[
0
])),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, DetectX86Flag,
0
,
10
),
BPF_STMT(BPF_LD
+
BPF_W
+
BPF_ABS, (uint32_t) offsetof(struct seccomp_data, arch)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, AUDIT_ARCH_X86_64,
0
,
1
),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
864
& SECCOMP_RET_DATA)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, AUDIT_ARCH_I386,
0
,
1
),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
386
& SECCOMP_RET_DATA)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, AUDIT_ARCH_ARM,
0
,
1
),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
0xA32
& SECCOMP_RET_DATA)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, AUDIT_ARCH_AARCH64,
0
,
1
),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
0xA64
& SECCOMP_RET_DATA)),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
6
& SECCOMP_RET_DATA)),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ALLOW)
};
struct sock_fprog program
=
{
.
len
=
(unsigned short) (sizeof(
filter
)
/
sizeof(
filter
[
0
])),
.
filter
=
filter
};
errno
=
0
;
if
(prctl(PR_SET_NO_NEW_PRIVS,
1
,
0
,
0
,
0
)) {
LOG(ERROR) <<
"prctl(PR_SET_NO_NEW_PRIVS) "
<< strerror(errno);
}
errno
=
0
;
if
(prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &program)) {
LOG(ERROR) <<
"prctl(PR_SET_SECCOMP) "
<< strerror(errno);
}
}
void install_check_arch_seccomp() {
struct sock_filter
filter
[
15
]
=
{
BPF_STMT(BPF_LD
+
BPF_W
+
BPF_ABS, (uint32_t) offsetof(struct seccomp_data, nr)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, __NR_getpid,
0
,
12
),
BPF_STMT(BPF_LD
+
BPF_W
+
BPF_ABS, (uint32_t) offsetof(struct seccomp_data, args[
0
])),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, DetectX86Flag,
0
,
10
),
BPF_STMT(BPF_LD
+
BPF_W
+
BPF_ABS, (uint32_t) offsetof(struct seccomp_data, arch)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, AUDIT_ARCH_X86_64,
0
,
1
),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
864
& SECCOMP_RET_DATA)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, AUDIT_ARCH_I386,
0
,
1
),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
386
& SECCOMP_RET_DATA)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, AUDIT_ARCH_ARM,
0
,
1
),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
0xA32
& SECCOMP_RET_DATA)),
BPF_JUMP(BPF_JMP
+
BPF_JEQ, AUDIT_ARCH_AARCH64,
0
,
1
),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
0xA64
& SECCOMP_RET_DATA)),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ERRNO | (
6
& SECCOMP_RET_DATA)),
BPF_STMT(BPF_RET
+
BPF_K, SECCOMP_RET_ALLOW)
};
struct sock_fprog program
=
{
.
len
=
(unsigned short) (sizeof(
filter
)
/
sizeof(
filter
[
0
])),
.
filter
=
filter
};
errno
=
0
;
if
(prctl(PR_SET_NO_NEW_PRIVS,
1
,
0
,
0
,
0
)) {
LOG(ERROR) <<
"prctl(PR_SET_NO_NEW_PRIVS) "
<< strerror(errno);
}
errno
=
0
;
if
(prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &program)) {
LOG(ERROR) <<
"prctl(PR_SET_SECCOMP) "
<< strerror(errno);
}
}
string check_arch_by_seccomp() {
if
(get_sdk_level() < __ANDROID_API_N_MR1__){
return
"";
}
errno
=
0
;
syscall(__NR_getpid, DetectX86Flag);
if
(errno
=
=
386
) {
return
"I386设备"
;
}
else
if
(errno
=
=
864
) {
return
"X86_64设备"
;
}
else
if
(errno
=
=
0xA32
|| errno
=
=
0xA64
) {
return
"";
}
else
if
(errno
=
=
0
) {
/
/
可能是没有开启seccomp
return
"";
}
return
(
"疑似X86模拟器设备"
+
to_string(errno));
}
string check_arch_by_seccomp() {
if
(get_sdk_level() < __ANDROID_API_N_MR1__){
return
"";
}
errno
=
0
;
syscall(__NR_getpid, DetectX86Flag);
if
(errno
=
=
386
) {
return
"I386设备"
;
}
else
if
(errno
=
=
864
) {
return
"X86_64设备"
;
}
else
if
(errno
=
=
0xA32
|| errno
=
=
0xA64
) {
return
"";
}
else
if
(errno
=
=
0
) {
/
/
可能是没有开启seccomp
return
"";
}
return
(
"疑似X86模拟器设备"
+
to_string(errno));
}
int
thermal_check() {
DIR
*
dir_ptr;
int
count
=
0
;
struct dirent
*
entry;
if
((dir_ptr
=
opendir(
"/sys/class/thermal/"
)) !
=
nullptr) {
while
((entry
=
readdir(dir_ptr))) {
if
(!strcmp(entry
-
>d_name,
"."
) || !strcmp(entry
-
>d_name,
".."
)) {
continue
;
}
char
*
tmp
=
entry
-
>d_name;
if
(strstr(tmp,
"thermal_zone"
) !
=
nullptr) {
count
+
+
;
}
}
closedir(dir_ptr);
}
else
{
count
=
-
1
;
}
return
count;
}
int
thermal_check() {
DIR
*
dir_ptr;
int
count
=
0
;
struct dirent
*
entry;
if
((dir_ptr
=
opendir(
"/sys/class/thermal/"
)) !
=
nullptr) {
while
((entry
=
readdir(dir_ptr))) {
if
(!strcmp(entry
-
>d_name,
"."
) || !strcmp(entry
-
>d_name,
".."
)) {
continue
;
}
char
*
tmp
=
entry
-
>d_name;
if
(strstr(tmp,
"thermal_zone"
) !
=
nullptr) {
count
+
+
;
}
}
closedir(dir_ptr);
}
else
{
count
=
-
1
;
}
return
count;
}
string simulator_files_check() {
if
(file_exist(
"/system/bin/androVM-prop"
)) {
/
/
检测androidVM
return
"/system/bin/androVM-prop"
;
}
else
if
(file_exist(
"/system/bin/microvirt-prop"
)) {
/
/
检测逍遥模拟器
-
-
新版本找不到特征
return
"/system/bin/microvirt-prop"
;
}
else
if
(file_exist(
"/system/lib/libdroid4x.so"
)) {
/
/
检测海马模拟器
return
"/system/lib/libdroid4x.so"
;
}
else
if
(file_exist(
"/system/bin/windroyed"
)) {
/
/
检测文卓爷模拟器
return
"/system/bin/windroyed"
;
}
else
if
(file_exist(
"/system/bin/nox-prop"
)) {
/
/
检测夜神模拟器
-
-
某些版本找不到特征
return
"/system/bin/nox-prop"
;
}
else
if
(file_exist(
"system/lib/libnoxspeedup.so"
)) {
/
/
检测夜神模拟器
return
"system/lib/libnoxspeedup.so"
;
}
else
if
(file_exist(
"/system/bin/ttVM-prop"
)) {
/
/
检测天天模拟器
return
"/system/bin/ttVM-prop"
;
}
else
if
(file_exist(
"/data/.bluestacks.prop"
)) {
/
/
检测bluestacks模拟器
51
模拟器
return
"/data/.bluestacks.prop"
;
}
else
if
(file_exist(
"/system/bin/duosconfig"
)) {
/
/
检测AMIDuOS模拟器
return
"/system/bin/duosconfig"
;
}
else
if
(file_exist(
"/system/etc/xxzs_prop.sh"
)) {
/
/
检测星星模拟器
return
"/system/etc/xxzs_prop.sh"
;
}
else
if
(file_exist(
"/system/etc/mumu-configs/device-prop-configs/mumu.config"
)) {
/
/
网易MuMu模拟器
return
"/system/etc/mumu-configs/device-prop-configs/mumu.config"
;
}
else
if
(file_exist(
"/system/priv-app/ldAppStore"
)) {
/
/
雷电模拟器
return
"/system/priv-app/ldAppStore"
;
}
else
if
(file_exist(
"system/bin/ldinit"
) && file_exist(
"system/bin/ldmountsf"
)) {
/
/
雷电模拟器
return
"system/bin/ldinit"
;
}
else
if
(file_exist(
"/system/app/AntStore"
) && file_exist(
"/system/app/AntLauncher"
)) {
/
/
小蚁模拟器
return
"/system/app/AntStore"
;
}
else
if
(file_exist(
"vmos.prop"
)) {
/
/
vmos虚拟机
return
"vmos.prop"
;
}
else
if
(file_exist(
"fstab.titan"
) && file_exist(
"init.titan.rc"
)) {
/
/
光速虚拟机
return
"fstab.titan"
;
}
else
if
(file_exist(
"x8.prop"
)) {
/
/
x8沙箱和
51
虚拟机
return
"x8.prop"
;
}
else
if
(file_exist(
"/system/lib/libc_malloc_debug_qemu.so"
)) {
/
/
AVD QEMU
return
"/system/lib/libc_malloc_debug_qemu.so"
;
}
LOGD(
"simulator file check info not find "
);
return
"";
}
string simulator_files_check() {
if
(file_exist(
"/system/bin/androVM-prop"
)) {
/
/
检测androidVM
return
"/system/bin/androVM-prop"
;
}
else
if
(file_exist(
"/system/bin/microvirt-prop"
)) {
/
/
检测逍遥模拟器
-
-
新版本找不到特征
return
"/system/bin/microvirt-prop"
;
}
else
if
(file_exist(
"/system/lib/libdroid4x.so"
)) {
/
/
检测海马模拟器
return
"/system/lib/libdroid4x.so"
;
}
else
if
(file_exist(
"/system/bin/windroyed"
)) {
/
/
检测文卓爷模拟器
return
"/system/bin/windroyed"
;
}
else
if
(file_exist(
"/system/bin/nox-prop"
)) {
/
/
检测夜神模拟器
-
-
某些版本找不到特征
return
"/system/bin/nox-prop"
;
}
else
if
(file_exist(
"system/lib/libnoxspeedup.so"
)) {
/
/
检测夜神模拟器
return
"system/lib/libnoxspeedup.so"
;
}
else
if
(file_exist(
"/system/bin/ttVM-prop"
)) {
/
/
检测天天模拟器
return
"/system/bin/ttVM-prop"
;
}
else
if
(file_exist(
"/data/.bluestacks.prop"
)) {
/
/
检测bluestacks模拟器
51
模拟器
return
"/data/.bluestacks.prop"
;
}
else
if
(file_exist(
"/system/bin/duosconfig"
)) {
/
/
检测AMIDuOS模拟器
return
"/system/bin/duosconfig"
;
}
else
if
(file_exist(
"/system/etc/xxzs_prop.sh"
)) {
/
/
检测星星模拟器
return
"/system/etc/xxzs_prop.sh"
;
}
else
if
(file_exist(
"/system/etc/mumu-configs/device-prop-configs/mumu.config"
)) {
/
/
网易MuMu模拟器
return
"/system/etc/mumu-configs/device-prop-configs/mumu.config"
;
}
else
if
(file_exist(
"/system/priv-app/ldAppStore"
)) {
/
/
雷电模拟器
return
"/system/priv-app/ldAppStore"
;
}
else
if
(file_exist(
"system/bin/ldinit"
) && file_exist(
"system/bin/ldmountsf"
)) {
/
/
雷电模拟器
return
"system/bin/ldinit"
;
}
else
if
(file_exist(
"/system/app/AntStore"
) && file_exist(
"/system/app/AntLauncher"
)) {
/
/
小蚁模拟器
return
"/system/app/AntStore"
;
}
else
if
(file_exist(
"vmos.prop"
)) {
/
/
vmos虚拟机
return
"vmos.prop"
;
}
else
if
(file_exist(
"fstab.titan"
) && file_exist(
"init.titan.rc"
)) {
/
/
光速虚拟机
return
"fstab.titan"
;
}
else
if
(file_exist(
"x8.prop"
)) {
/
/
x8沙箱和
51
虚拟机
return
"x8.prop"
;
}
else
if
(file_exist(
"/system/lib/libc_malloc_debug_qemu.so"
)) {
/
/
AVD QEMU
return
"/system/lib/libc_malloc_debug_qemu.so"
;
}
LOGD(
"simulator file check info not find "
);
return
"";
}
public static ListItemBean checkEmulator(Context context) {
ArrayList<String> choose
=
new ArrayList<>();
/
/
try
{
/
/
String[] strArr
=
{
/
/
"/boot/bstmods/vboxguest.ko"
,
/
/
"/boot/bstmods/vboxsf.ko"
,
/
/
"/dev/mtp_usb"
,
/
/
"/dev/qemu_pipe"
,
/
/
"/dev/socket/baseband_genyd"
,
/
/
"/dev/socket/genyd"
,
/
/
"/dev/socket/qemud"
,
/
/
"/dev/socket/windroyed-audio"
,
/
/
"/dev/socket/windroyed-camera"
,
/
/
"/dev/socket/windroyed-gps"
,
/
/
"/dev/socket/windroyed-sensors"
,
/
/
"/dev/vboxguest"
,
/
/
"/dev/vboxpci"
,
/
/
"/dev/vboxuser"
,
/
/
"/fstab.goldfish"
,
/
/
"/fstab.nox"
,
/
/
"/fstab.ranchu-encrypt"
,
/
/
"/fstab.ranchu-noencrypt"
,
/
/
"/fstab.ttVM_x86"
,
/
/
"/fstab.vbox86"
,
/
/
"/init.goldfish.rc"
,
/
/
"/init.magisk.rc"
,
/
/
"/init.nox.rc"
,
/
/
"/init.ranchu-encrypt.rc"
,
/
/
"/init.ranchu-noencrypt.rc"
,
/
/
"/init.ranchu.rc"
,
/
/
"/init.ttVM_x86.rc"
,
/
/
"/init.vbox86.rc"
,
/
/
"/init.vbox86p.rc"
,
/
/
"/init.windroye.rc"
,
/
/
"/init.windroye.sh"
,
/
/
"/init.x86.rc"
,
/
/
"/proc/irq/20/vboxguest"
,
/
/
"/sdcard/Android/data/com.redfinger.gamemanage"
,
/
/
"/stab.andy"
,
/
/
"/sys/bus/pci/drivers/vboxguest"
,
/
/
"/sys/bus/pci/drivers/vboxpci"
,
/
/
"/sys/bus/platform/drivers/qemu_pipe"
,
/
/
"/sys/bus/platform/drivers/qemu_pipe/qemu_pipe"
,
/
/
"/sys/bus/platform/drivers/qemu_trace"
,
/
/
"/sys/bus/virtio/drivers/itolsvmlgtp"
,
/
/
"/sys/bus/virtio/drivers/itoolsvmhft"
,
/
/
"/sys/class/bdi/vboxsf-1"
,
/
/
"/sys/class/bdi/vboxsf-2"
,
/
/
"/sys/class/bdi/vboxsf-3"
,
/
/
"/sys/class/misc/qemu_pipe"
,
/
/
"/sys/class/misc/vboxguest"
,
/
/
"/sys/class/misc/vboxuser"
,
/
/
"/sys/devices/platform/qemu_pipe"
,
/
/
"/sys/devices/virtual/bdi/vboxsf-1"
,
/
/
"/sys/devices/virtual/bdi/vboxsf-2"
,
/
/
"/sys/devices/virtual/bdi/vboxsf-3"
,
/
/
"/sys/devices/virtual/misc/qemu_pipe"
,
/
/
"/sys/devices/virtual/misc/vboxguest"
,
/
/
"/sys/devices/virtual/misc/vboxpci"
,
/
/
"/sys/devices/virtual/misc/vboxuser"
,
/
/
"/sys/fs/selinux/booleans/in_qemu"
,
/
/
"/sys/kernel/debug/bdi/vboxsf-1"
,
/
/
"/sys/kernel/debug/bdi/vboxsf-2"
,
/
/
"/sys/kernel/debug/x86"
,
/
/
"/sys/module/qemu_trace_sysfs"
,
/
/
"/sys/module/vboxguest"
,
/
/
"/sys/module/vboxguest/drivers/pci:vboxguest"
,
/
/
"/sys/module/vboxpcism"
,
/
/
"/sys/module/vboxsf"
,
/
/
"/sys/module/vboxvideo"
,
/
/
"/sys/module/virtio_pt/drivers/virtio:itoolsvmhft"
,
/
/
"/sys/module/virtio_pt_ie/drivers/virtio:itoolsvmlgtp"
,
/
/
"/sys/qemu_trace"
,
/
/
"/system/app/GenymotionLayout"
,
/
/
"/system/bin/OpenglService"
,
/
/
"/system/bin/androVM-vbox-sf"
,
/
/
"/system/bin/droid4x"
,
/
/
"/system/bin/droid4x-prop"
,
/
/
"/system/bin/droid4x-vbox-sf"
,
/
/
"/system/bin/droid4x_setprop"
,
/
/
"/system/bin/enable_nox"
,
/
/
"/system/bin/genymotion-vbox-sf"
,
/
/
"/system/bin/microvirt-prop"
,
/
/
"/system/bin/microvirt-vbox-sf"
,
/
/
"/system/bin/microvirt_setprop"
,
/
/
"/system/bin/microvirtd"
,
/
/
"/system/bin/mount.vboxsf"
,
/
/
"/system/bin/nox"
,
/
/
"/system/bin/nox-prop"
,
/
/
"/system/bin/nox-vbox-sf"
,
/
/
"/system/bin/nox_setprop"
,
/
/
"/system/bin/noxd"
,
/
/
"/system/bin/noxscreen"
,
/
/
"/system/bin/noxspeedup"
,
/
/
"/system/bin/qemu-props"
,
/
/
"/system/bin/qemud"
,
/
/
"/system/bin/shellnox"
,
/
/
"/system/bin/ttVM-prop"
,
/
/
"/system/bin/windroyed"
,
/
/
"/system/droid4x"
,
/
/
"/system/etc/init.droid4x.sh"
,
/
/
"/system/etc/init.tiantian.sh"
,
/
/
"/system/lib/egl/libEGL_emulation.so"
,
/
/
"/system/lib/egl/libEGL_tiantianVM.so"
,
/
/
"/system/lib/egl/libEGL_windroye.so"
,
/
/
"/system/lib/egl/libGLESv1_CM_emulation.so"
,
/
/
"/system/lib/egl/libGLESv1_CM_tiantianVM.so"
,
/
/
"/system/lib/egl/libGLESv1_CM_windroye.so"
,
/
/
"/system/lib/egl/libGLESv2_emulation.so"
,
/
/
"/system/lib/egl/libGLESv2_tiantianVM.so"
,
/
/
"/system/lib/egl/libGLESv2_windroye.so"
,
/
/
"/system/lib/hw/audio.primary.vbox86.so"
,
/
/
"/system/lib/hw/audio.primary.windroye.so"
,
/
/
"/system/lib/hw/audio.primary.x86.so"
,
/
/
"/system/lib/hw/autio.primary.nox.so"
,
/
/
"/system/lib/hw/camera.vbox86.so"
,
/
/
"/system/lib/hw/camera.windroye.jpeg.so"
,
/
/
"/system/lib/hw/camera.windroye.so"
,
/
/
"/system/lib/hw/camera.x86.so"
,
/
/
"/system/lib/hw/gps.nox.so"
,
/
/
"/system/lib/hw/gps.vbox86.so"
,
/
/
"/system/lib/hw/gps.windroye.so"
,
/
/
"/system/lib/hw/gralloc.nox.so"
,
/
/
"/system/lib/hw/gralloc.vbox86.so"
,
/
/
"/system/lib/hw/gralloc.windroye.so"
,
/
/
"/system/lib/hw/sensors.nox.so"
,
/
/
"/system/lib/hw/sensors.vbox86.so"
,
/
/
"/system/lib/hw/sensors.windroye.so"
,
/
/
"/system/lib/init.nox.sh"
,
/
/
"/system/lib/libGM_OpenglSystemCommon.so"
,
/
/
"/system/lib/libc_malloc_debug_qemu.so"
,
/
/
"/system/lib/libclcore_x86.bc"
,
/
/
"/system/lib/libdroid4x.so"
,
/
/
"/system/lib/libnoxd.so"
,
/
/
"/system/lib/libnoxspeedup.so"
,
/
/
"/system/lib/modules/3.10.30-android-x86.hd+"
,
/
/
"/system/lib/vboxguest.ko"
,
/
/
"/system/lib/vboxpcism.ko"
,
/
/
"/system/lib/vboxsf.ko"
,
/
/
"/system/lib/vboxvideo.ko"
,
/
/
"/system/lib64/egl/libEGL_emulation.so"
,
/
/
"/system/lib64/egl/libGLESv1_CM_emulation.so"
,
/
/
"/system/lib64/egl/libGLESv2_emulation.so"
,
/
/
"/vendor/lib64/egl/libEGL_emulation.so"
,
/
/
"/vendor/lib64/egl/libGLESv1_CM_emulation.so"
,
/
/
"/vendor/lib64/egl/libGLESv2_emulation.so"
,
/
/
"/vendor/lib64/libandroidemu.so"
,
/
/
"/system/lib64/hw/gralloc.ranchu.so"
,
/
/
"/system/lib64/libc_malloc_debug_qemu.so"
,
/
/
"/system/usr/Keylayout/droid4x_Virtual_Input.kl"
,
/
/
"/system/usr/idc/Genymotion_Virtual_Input.idc"
,
/
/
"/system/usr/idc/droid4x_Virtual_Input.idc"
,
/
/
"/system/usr/idc/nox_Virtual_Input.idc"
,
/
/
"/system/usr/idc/windroye.idc"
,
/
/
"/system/usr/keychars/nox_gpio.kcm"
,
/
/
"/system/usr/keychars/windroye.kcm"
,
/
/
"/system/usr/keylayout/Genymotion_Virtual_Input.kl"
,
/
/
"/system/usr/keylayout/nox_Virtual_Input.kl"
,
/
/
"/system/usr/keylayout/nox_gpio.kl"
,
/
/
"/system/usr/keylayout/windroye.kl"
,
/
/
"system/etc/init/ndk_translation_arm64.rc"
,
/
/
"/system/xbin/noxsu"
,
/
/
"/ueventd.android_x86.rc"
,
/
/
"/ueventd.andy.rc"
,
/
/
"/ueventd.goldfish.rc"
,
/
/
"/ueventd.nox.rc"
,
/
/
"/ueventd.ranchu.rc"
,
/
/
"/ueventd.ttVM_x86.rc"
,
/
/
"/ueventd.vbox86.rc"
,
/
/
"/vendor/lib64/libgoldfish-ril.so"
,
/
/
"/vendor/lib64/libgoldfish_codecs_common.so"
,
/
/
"/vendor/lib64/libstagefright_goldfish_avcdec.so"
,
/
/
"/vendor/lib64/libstagefright_goldfish_vpxdec.so"
,
/
/
"/x86.prop"
/
/
};
/
/
for
(
int
i
=
0
; i <
7
; i
+
+
) {
/
/
String f
=
strArr[i];
/
/
if
(new
File
(f).exists())
/
/
choose.add(f);
/
/
}
/
/
} catch (Exception e) {
/
/
e.printStackTrace();
/
/
}
try
{
String[] myArr
=
{
"generic"
,
"vbox"
};
for
(String
str
: myArr) {
if
(Build.FINGERPRINT.contains(
str
))
choose.add(Build.FINGERPRINT);
}
} catch (Exception e) {
e.printStackTrace();
}
try
{
String[] myArr
=
{
"google_sdk"
,
"emulator"
,
"android sdk built for"
,
"droid4x"
};
for
(String
str
: myArr) {
if
(Build.MODEL.contains(
str
))
choose.add(Build.MODEL);
}
} catch (Exception e) {
e.printStackTrace();
}
try
{
String[] myArr
=
{
"Genymotion"
};
for
(String
str
: myArr) {
if
(Build.MANUFACTURER.contains(
str
))
choose.add(Build.MANUFACTURER);
}
} catch (Exception e) {
e.printStackTrace();
}
try
{
String[] myArr
=
{
"google_sdk"
,
"sdk_phone"
,
"sdk_x86"
,
"vbox86p"
,
"nox"
};
for
(String
str
: myArr) {
if
(Build.PRODUCT.toLowerCase(Locale.ROOT).contains(
str
))
choose.add(Build.PRODUCT);
}
} catch (Exception e) {
e.printStackTrace();
}
try
{
String[] myArr
=
{
"nox"
};
for
(String
str
: myArr) {
if
(Build.BOARD.toLowerCase(Locale.ROOT).contains(
str
))
choose.add(Build.BOARD);
}
} catch (Exception e) {
e.printStackTrace();
}
try
{
String[] myArr
=
{
"nox"
};
for
(String
str
: myArr) {
if
(Build.BOOTLOADER.toLowerCase(Locale.ROOT).contains(
str
))
choose.add(Build.BOOTLOADER);
}
} catch (Exception e) {
e.printStackTrace();
}
try
{
String[] myArr
=
{
"ranchu"
,
"vbox86"
,
"goldfish"
};
for
(String
str
: myArr) {
if
(Build.HARDWARE.equalsIgnoreCase(
str
))
choose.add(Build.HARDWARE);
}
} catch (Exception e) {
e.printStackTrace();
}
try
{
Enumeration<NetworkInterface> networkInterfaces
=
NetworkInterface.getNetworkInterfaces();
while
(networkInterfaces.hasMoreElements()) {
NetworkInterface ele
=
networkInterfaces.nextElement();
if
(ele !
=
null) {
Enumeration<InetAddress> inetAddresses
=
ele.getInetAddresses();
while
(inetAddresses.hasMoreElements()) {
InetAddress nextElement
=
inetAddresses.nextElement();
if
(!nextElement.isLoopbackAddress() &&
(nextElement instanceof Inet4Address)) {
String ip
=
nextElement.getHostAddress();
if
(ip
=
=
null)
continue
;
if
(ip.equalsIgnoreCase(
"10.0.2.15"
) ||
ip.equalsIgnoreCase(
"10.0.2.16"
)) {
choose.add(ip);
}
}
}
}
}
} catch (Exception e) {
e.printStackTrace();
}
/
/
try
{
/
/
String[] qemuProps
=
{
/
/
"ro.kernel.qemu.avd_name"
,
/
/
"ro.kernel.qemu.gles"
,
/
/
"ro.kernel.qemu.gltransport"
,
/
/
"ro.kernel.qemu.opengles.version"
,
/
/
"ro.kernel.qemu.uirenderer"
,
/
/
"ro.kernel.qemu.vsync"
,
/
/
"ro.qemu.initrc"
,
/
/
"init.svc.qemu-props"
,
/
/
"qemu.adb.secure"
,
/
/
"qemu.cmdline"
,
/
/
"qemu.hw.mainkeys"
,
/
/
"qemu.logcat"
,
/
/
"ro.adb.qemud"
,
/
/
"qemu.sf.fake_camera"
,
/
/
"qemu.sf.lcd_density"
,
/
/
"qemu.timezone"
,
/
/
"init.svc.goldfish-logcat"
,
/
/
"ro.boottime.goldfish-logcat"
,
/
/
"ro.hardware.audio.primary"
,
/
/
"init.svc.ranchu-net"
,
/
/
"init.svc.ranchu-setup"
,
/
/
"ro.boottime.ranchu-net"
,
/
/
"ro.boottime.ranchu-setup"
,
/
/
"init.svc.droid4x"
,
/
/
"init.svc.noxd"
,
/
/
"init.svc.qemud"
,
/
/
"init.svc.goldfish-setup"
,
/
/
"init.svc.goldfish-logcat"
,
/
/
"init.svc.ttVM_x86-setup"
,
/
/
"vmos.browser.home"
,
/
/
"vmos.camera.enable"
,
/
/
"ro.trd_yehuo_searchbox"
,
/
/
"init.svc.microvirtd"
,
/
/
"init.svc.vbox86-setup"
,
/
/
"ro.ndk_translation.version"
,
/
/
"redroid.width"
,
/
/
"redroid.height"
,
/
/
"redroid.fps"
,
/
/
"ro.rf.vmname"
/
/
};
/
/
/
/
for
(String
str
: qemuProps) {
/
/
String val
=
SystemPropertiesUtils.getProperty(
str
, null);
/
/
if
(val !
=
null) {
/
/
choose.add(
str
);
/
/
}
/
/
}
/
/
} catch (Throwable e) {
/
/
e.printStackTrace();
/
/
}
/
/
判断是否存在指定硬件
PackageManager pm
=
null;
try
{
pm
=
context.getPackageManager();
String[] features
=
{
/
/
PackageManager.FEATURE_RAM_NORMAL,
/
/
这个存在问题,自己组装的手机可能导致这个痕迹找不到
PackageManager.FEATURE_BLUETOOTH,
PackageManager.FEATURE_CAMERA_FLASH,
PackageManager.FEATURE_TELEPHONY
};
for
(String feature : features) {
if
(!pm.hasSystemFeature(feature)) {
choose.add(feature);
}
}
} catch (Throwable ignored) {
}
try
{
String[] emuPkgs
=
{
"com.google.android.launcher.layouts.genymotion"
,
"com.bluestacks"
,
"com.bignox.app"
};
for
(String pkg : emuPkgs) {
try
{
if
(pm !
=
null) {
pm.getPackageInfo(pkg,
0
);
}
choose.add(pkg);
} catch (Throwable e) {
/
/
e.printStackTrace();
}
}
} catch (Throwable ignored) {
}
try
{
SensorManager sensor
=
(SensorManager) context.getSystemService(Context.SENSOR_SERVICE);
int
sensorSize
=
sensor.getSensorList(Sensor.TYPE_ALL).size();
for
(
int
i
=
0
; i < sensorSize; i
+
+
) {
Sensor s
=
sensor.getDefaultSensor(i);
if
(s !
=
null && s.getName().contains(
"Goldfish"
)) {
choose.add(s.getName());
}
}
} catch (Throwable ignored) {
}
try
{
if
(checkSelfPermission(context,
"android.permission.READ_SMS"
)
=
=
0
||
checkSelfPermission(context,
"android.permission.READ_PHONE_NUMBERS"
)
=
=
0
||
checkSelfPermission(context,
"android.permission.READ_PHONE_STATE"
)
=
=
0
) {
TelephonyManager telephonyManager
=
(TelephonyManager) context.getSystemService(Context.TELEPHONY_SERVICE);
String phoneNumber
=
telephonyManager.getLine1Number();
String[] phoneNumbers
=
{
"15555215554"
,
"15555215556"
,
"15555215558"
,
"15555215560"
,
"15555215562"
,
"15555215564"
,
"15555215566"
,
"15555215568"
,
"15555215570"
,
"15555215572"
,
"15555215574"
,
"15555215576"
,
"15555215578"
,
"15555215580"
,
"15555215582"
,
"15555215584"
};
if
(phoneNumber!
=
null) {
for
(String phone : phoneNumbers) {
if
(phoneNumber.equalsIgnoreCase(phone)) {
choose.add(phone);
break
;
}
}
}
}
} catch (Exception e) {
e.printStackTrace();
}
if
(choose.size() >
0
) {
ListItemBean item
=
new ListItemBean(
"检测到APK运行在虚拟机&模拟器中"
,
ListItemBean.RiskLeave.Deadly,
choose.toString()
);
for
(String
str
: choose) {
item.putData(
str
);
}
return
item;
}
return
null;
}
public static ListItemBean checkEmulator(Context context) {
ArrayList<String> choose
=
new ArrayList<>();
/
/
try
{
/
/
String[] strArr
=
{
/
/
"/boot/bstmods/vboxguest.ko"
,
/
/
"/boot/bstmods/vboxsf.ko"
,
/
/
"/dev/mtp_usb"
,
/
/
"/dev/qemu_pipe"
,
/
/
"/dev/socket/baseband_genyd"
,
/
/
"/dev/socket/genyd"
,
/
/
"/dev/socket/qemud"
,
/
/
"/dev/socket/windroyed-audio"
,
/
/
"/dev/socket/windroyed-camera"
,
/
/
"/dev/socket/windroyed-gps"
,
/
/
"/dev/socket/windroyed-sensors"
,
/
/
"/dev/vboxguest"
,
/
/
"/dev/vboxpci"
,
/
/
"/dev/vboxuser"
,
/
/
"/fstab.goldfish"
,
/
/
"/fstab.nox"
,
/
/
"/fstab.ranchu-encrypt"
,
/
/
"/fstab.ranchu-noencrypt"
,
/
/
"/fstab.ttVM_x86"
,
/
/
"/fstab.vbox86"
,
/
/
"/init.goldfish.rc"
,
/
/
"/init.magisk.rc"
,
/
/
"/init.nox.rc"
,
/
/
"/init.ranchu-encrypt.rc"
,
/
/
"/init.ranchu-noencrypt.rc"
,
/
/
"/init.ranchu.rc"
,
/
/
"/init.ttVM_x86.rc"
,
/
/
"/init.vbox86.rc"
,
/
/
"/init.vbox86p.rc"
,
/
/
"/init.windroye.rc"
,
/
/
"/init.windroye.sh"
,
/
/
"/init.x86.rc"
,
/
/
"/proc/irq/20/vboxguest"
,
/
/
"/sdcard/Android/data/com.redfinger.gamemanage"
,
/
/
"/stab.andy"
,
/
/
"/sys/bus/pci/drivers/vboxguest"
,
/
/
"/sys/bus/pci/drivers/vboxpci"
,
/
/
"/sys/bus/platform/drivers/qemu_pipe"
,
/
/
"/sys/bus/platform/drivers/qemu_pipe/qemu_pipe"
,
/
/
"/sys/bus/platform/drivers/qemu_trace"
,
/
/
"/sys/bus/virtio/drivers/itolsvmlgtp"
,
/
/
"/sys/bus/virtio/drivers/itoolsvmhft"
,
/
/
"/sys/class/bdi/vboxsf-1"
,
/
/
"/sys/class/bdi/vboxsf-2"
,
/
/
"/sys/class/bdi/vboxsf-3"
,
/
/
"/sys/class/misc/qemu_pipe"
,
/
/
"/sys/class/misc/vboxguest"
,
/
/
"/sys/class/misc/vboxuser"
,
/
/
"/sys/devices/platform/qemu_pipe"
,
/
/
"/sys/devices/virtual/bdi/vboxsf-1"
,
/
/
"/sys/devices/virtual/bdi/vboxsf-2"
,
/
/
"/sys/devices/virtual/bdi/vboxsf-3"
,
/
/
"/sys/devices/virtual/misc/qemu_pipe"
,
/
/
"/sys/devices/virtual/misc/vboxguest"
,
/
/
"/sys/devices/virtual/misc/vboxpci"
,
/
/
"/sys/devices/virtual/misc/vboxuser"
,
/
/
"/sys/fs/selinux/booleans/in_qemu"
,
/
/
"/sys/kernel/debug/bdi/vboxsf-1"
,
/
/
"/sys/kernel/debug/bdi/vboxsf-2"
,
/
/
"/sys/kernel/debug/x86"
,
/
/
"/sys/module/qemu_trace_sysfs"
,
/
/
"/sys/module/vboxguest"
,
/
/
"/sys/module/vboxguest/drivers/pci:vboxguest"
,
/
/
"/sys/module/vboxpcism"
,
/
/
"/sys/module/vboxsf"
,
/
/
"/sys/module/vboxvideo"
,
/
/
"/sys/module/virtio_pt/drivers/virtio:itoolsvmhft"
,
/
/
"/sys/module/virtio_pt_ie/drivers/virtio:itoolsvmlgtp"
,
/
/
"/sys/qemu_trace"
,
/
/
"/system/app/GenymotionLayout"
,
/
/
"/system/bin/OpenglService"
,
/
/
"/system/bin/androVM-vbox-sf"
,
/
/
"/system/bin/droid4x"
,
/
/
"/system/bin/droid4x-prop"
,
/
/
"/system/bin/droid4x-vbox-sf"
,
/
/
"/system/bin/droid4x_setprop"
,
/
/
"/system/bin/enable_nox"
,
/
/
"/system/bin/genymotion-vbox-sf"
,
/
/
"/system/bin/microvirt-prop"
,
/
/
"/system/bin/microvirt-vbox-sf"
,
/
/
"/system/bin/microvirt_setprop"
,
/
/
"/system/bin/microvirtd"
,
/
/
"/system/bin/mount.vboxsf"
,
/
/
"/system/bin/nox"
,
/
/
"/system/bin/nox-prop"
,
/
/
"/system/bin/nox-vbox-sf"
,
/
/
"/system/bin/nox_setprop"
,
/
/
"/system/bin/noxd"
,
/
/
"/system/bin/noxscreen"
,
/
/
"/system/bin/noxspeedup"
,
/
/
"/system/bin/qemu-props"
,
/
/
"/system/bin/qemud"
,
/
/
"/system/bin/shellnox"
,
/
/
"/system/bin/ttVM-prop"
,
/
/
"/system/bin/windroyed"
,
/
/
"/system/droid4x"
,
/
/
"/system/etc/init.droid4x.sh"
,
/
/
"/system/etc/init.tiantian.sh"
,
/
/
"/system/lib/egl/libEGL_emulation.so"
,
/
/
"/system/lib/egl/libEGL_tiantianVM.so"
,
/
/
"/system/lib/egl/libEGL_windroye.so"
,
/
/
"/system/lib/egl/libGLESv1_CM_emulation.so"
,
/
/
"/system/lib/egl/libGLESv1_CM_tiantianVM.so"
,
/
/
"/system/lib/egl/libGLESv1_CM_windroye.so"
,
/
/
"/system/lib/egl/libGLESv2_emulation.so"
,
/
/
"/system/lib/egl/libGLESv2_tiantianVM.so"
,
/
/
"/system/lib/egl/libGLESv2_windroye.so"
,
/
/
"/system/lib/hw/audio.primary.vbox86.so"
,
/
/
"/system/lib/hw/audio.primary.windroye.so"
,
/
/
"/system/lib/hw/audio.primary.x86.so"
,
/
/
"/system/lib/hw/autio.primary.nox.so"
,
/
/
"/system/lib/hw/camera.vbox86.so"
,
/
/
"/system/lib/hw/camera.windroye.jpeg.so"
,
/
/
"/system/lib/hw/camera.windroye.so"
,
/
/
"/system/lib/hw/camera.x86.so"
,
/
/
"/system/lib/hw/gps.nox.so"
,
/
/
"/system/lib/hw/gps.vbox86.so"
,
/
/
"/system/lib/hw/gps.windroye.so"
,
/
/
"/system/lib/hw/gralloc.nox.so"
,
/
/
"/system/lib/hw/gralloc.vbox86.so"
,
/
/
"/system/lib/hw/gralloc.windroye.so"
,
/
/
"/system/lib/hw/sensors.nox.so"
,
/
/
"/system/lib/hw/sensors.vbox86.so"
,
/
/
"/system/lib/hw/sensors.windroye.so"
,
/
/
"/system/lib/init.nox.sh"
,
/
/
"/system/lib/libGM_OpenglSystemCommon.so"
,
/
/
"/system/lib/libc_malloc_debug_qemu.so"
,
/
/
"/system/lib/libclcore_x86.bc"
,
/
/
"/system/lib/libdroid4x.so"
,
/
/
"/system/lib/libnoxd.so"
,
/
/
"/system/lib/libnoxspeedup.so"
,
/
/
"/system/lib/modules/3.10.30-android-x86.hd+"
,
/
/
"/system/lib/vboxguest.ko"
,
/
/
"/system/lib/vboxpcism.ko"
,
/
/
"/system/lib/vboxsf.ko"
,
/
/
"/system/lib/vboxvideo.ko"
,
/
/
"/system/lib64/egl/libEGL_emulation.so"
,
/
/
"/system/lib64/egl/libGLESv1_CM_emulation.so"
,
/
/
"/system/lib64/egl/libGLESv2_emulation.so"
,
/
/
"/vendor/lib64/egl/libEGL_emulation.so"
,
/
/
"/vendor/lib64/egl/libGLESv1_CM_emulation.so"
,
/
/
"/vendor/lib64/egl/libGLESv2_emulation.so"
,
/
/
"/vendor/lib64/libandroidemu.so"
,
/
/
"/system/lib64/hw/gralloc.ranchu.so"
,
/
/
"/system/lib64/libc_malloc_debug_qemu.so"
,
/
/
"/system/usr/Keylayout/droid4x_Virtual_Input.kl"
,
/
/
"/system/usr/idc/Genymotion_Virtual_Input.idc"
,
/
/
"/system/usr/idc/droid4x_Virtual_Input.idc"
,
/
/
"/system/usr/idc/nox_Virtual_Input.idc"
,
/
/
"/system/usr/idc/windroye.idc"
,
/
/
"/system/usr/keychars/nox_gpio.kcm"
,
/
/
"/system/usr/keychars/windroye.kcm"
,
/
/
"/system/usr/keylayout/Genymotion_Virtual_Input.kl"
,
/
/
"/system/usr/keylayout/nox_Virtual_Input.kl"
,
/
/
"/system/usr/keylayout/nox_gpio.kl"
,
/
/
"/system/usr/keylayout/windroye.kl"
,
/
/
"system/etc/init/ndk_translation_arm64.rc"
,
/
/
"/system/xbin/noxsu"
,
/
/
"/ueventd.android_x86.rc"
,
/
/
"/ueventd.andy.rc"
,
/
/
"/ueventd.goldfish.rc"
,
/
/
"/ueventd.nox.rc"
,
/
/
"/ueventd.ranchu.rc"
,
/
/
"/ueventd.ttVM_x86.rc"
,
/
/
"/ueventd.vbox86.rc"
,
/
/
"/vendor/lib64/libgoldfish-ril.so"
,
/
/
"/vendor/lib64/libgoldfish_codecs_common.so"
,
/
/
"/vendor/lib64/libstagefright_goldfish_avcdec.so"
,
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)