Saturday 30 May 2015

How to Root Any Android Device with your simple pc and command prompt ( cmd ) ?

Hey I here you go , i provide the way to root any of your android device with command prompt.
   


before starting:
#enable usb debugging on your android .

for android 4.2 + , tap continuously on the build number to enable debugging mode

for other version find usb debugging in application settings..


for any doubts , suggestion , feedback , dont forget to comment

To start, you must have adb installed on the OS of your choice.




click here to download adb  , install usb driver from your device 
authorised website 





To confirm your device is properly detected, in the command prompt, run
Code:
adb devices 
Now copy busybox, su, superuser.apk to /data/local/tmp/ using adb.

Code:
adb push busybox /data/local/tmp adb push su /data/local/tmp adb push Superuser.apk /data/local/tmp 
[​IMG]

Now run adb shell

Code:
adb shell 
Note that you see a "$" sign in the command prompt. That means you are not rooted.
Next run the following commands in the shell to change permissions and get some limited privileges for the Superuser files:

Code:
chmod 6755 /data/local/tmp/su chmod 755 /data/local/tmp/busybox chmod 644 /data/local/tmp/Superuser.apk 
Note that the names of the files are case sensitive.

[​IMG]

Done?
Turn off your Android device using the power button.

Now you need to reboot your system into a Linux distro which has Nautilus.
Android and Linux, having a similar heritage, makes it possible for us to get root access over the Android phone if you are running with root privileges within Linux. I used an Ubuntu 11.04 Live USB disk to save the hassle of installing another os.

When you have booted into Linux, open up terminal and type:
Code:
sudo nautilus 
This would open up the Nautilus file browser with root privileges.

Now put your Android device into Download mode.
For Spice MI-410/Huawei Ideos X6/CherryMobile Magnum HD/Wellcom A99 the method is to hold down the Volume up button and simultaneously turn on the phone using the power on switch.

Once in download mode, connect the Android device using the microusb cable to the computer.
Now using the open Nautilus window, navigate to /UserData/local/tmp/ folder and verify that you have the files you sent to the device viz. su, busybox and Superuser.apk

Move/cut-paste su and busybox to /system/bin/ using Nautilus.
Move/cut-paste Superuser.apk to /system/app/ using Nautilus.

Now pull out the battery from your Android device.
I swear, this was the most tedious part on my MI-410 which has such a crappy back cover.

Now simply turn on your device.
You must now have root.

Verify by running:
Code:
adb shell su 
You'll note that the "$" prompt will turn into a "#" and you'll be prompted by a Superuser permission notification on your
device

[​IMG]

You have now completed your initiation brethren.
Welcome to the root club.

[​IMG]




you can download the recovery image and su file and then use fastboot command, 
the fast boot command will be coming soon
..........................................................................................................

Wednesday 27 May 2015

Hai!
everyone this blog is specially made for much 
               tricks 
               tips
 and new techs
all posts here will surely gain you more infos
..


stay tuned , bookmark my blog and mail me for new posts.... :)



click here to mail me

ETHICAL HACKING OR PENETRATION TESTING - FEEL LIKE JAMES BOND ?? :P

HAVE YOU EVER HEARD ABOUT HACKING ?? PC , BINARIES ,LINUX AND ROOTED DROIDS ??


   
LET US SEE WHATS PENETRATION TESTING OR ETHICAL HACKING ???




penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data.[1][2]
The process involves identifying the target systems and the goal, then reviewing the information available and undertaking available means to attain the goal. A penetration test target may be a white box (where all background and system information is provided) or black box (where only basic or no information is provided except the company name). A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient and which defenses (if any) were defeated in the penetration test.
Security issues uncovered through the penetration test should be reported to the system's owner.Penetration test reports may also assess the potential impacts to the organization and suggest countermeasures to reduce risks.
Penetration tests are valuable for several reasons


  1. Determining the feasibility of a particular set of attack vectors
  2. Identifying higher-risk vulnerabilities that result from a combination of lower-risk vulnerabilities exploited in a particular sequence
  3. Identifying vulnerabilities that may be difficult or impossible to detect with automated network or application vulnerability scanning software
  4. Assessing the magnitude of potential business and operational impacts of successful attacks
  5. Testing the ability of network defenders to successfully detect and respond to the attacks
  6. Providing evidence to support increased investments in security personnel and technology




Certified Ethical Hacker (CEH) is a qualification obtained in assessing the security of computer systems, using penetration testing techniques. The code for the CEH exam is 312-50, the certification is in Version 8 as of late 2013.
Penetration tests are usually employed by an organization who trusts them to attempt to penetrate networks and/or computer systems for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system(s) or network(s) is not.
The EC-Council offers another certification, known as Certified Network Defense Architect (CNDA). This certification is designed for United States Government agencies and is available only to members of selected agencies. Other than the name, the content of the course is exactly the same. The exam code for CNDA is 312-99

you can learn ethical hacking from anywhere in the world just g000gle it because its amazing..






ACCORDING TO ME, EVERYONE MUST 

LEARN BASIC HACKING TRICKS AND

 THUS BY PREVENTING YOURSELF 

FROM 

BEING HACKED BY SOME ONE ...



kali linux, backtrack, rooted or jail broken 

droids - google these keywords it will help  
u..




















learn to live: stay tuned for more posts



:)









note : hacking any source without proper permission is illegal

Sunday 24 May 2015

Why rooting or jailbreak your mobile devices ??

Why people root their Android 
             & jail break their iPhones,Windows smartphones ??????


Have you ever thought about it before ??



 It's to unlock the security features of a device.

It gives full permission to use full potential of a device-hardware and software





it's not necessary that only hackers should root their Android / other smartphones. 

First let us see about Android rooting


Rooting is the process of allowing users ofsmartphonestablets and other devices running the Android mobile operating systemto attain privileged control (known as root access) over various Android's subsystems. As Android uses the Linux kernel, rooting an Android device gives similar access to administrative permissions as on Linux or any other Unix-like operating system such asFreeBSD or OS X.
Rooting is often performed with the goal of overcoming limitations that carriers and hardware manufacturers put on some devices. Thus, rooting gives the ability (or permission) to alter or replace system applications and settings, run specialized apps that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. On Android, rooting can also facilitate the complete removal and replacement of the device's operating system, usually with a more recent release of its current operating system.
Root access is sometimes compared tojailbreaking devices running the Apple iOSoperating system. However, these are different concepts. Jailbreaking describes the bypass of several types of Apple prohibitions for the end user: modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved apps via sideloading, and granting the user elevated administration-level privileges. Only a minority of Android devices lock their bootloaders—and many vendors such as HTCSonyAsus and Googleexplicitly provide the ability to unlock devices, and even replace the operating system entirely. Similarly, the ability to sideload apps is typically permissible on Android devices without root permissions. Thus, it is primarily the third aspect of iOS jailbreaking relating to giving users superuser administrative privileges that most directly correlates to Android rooting.




LegalityEdit

International treaties have influenced the development of laws affecting rooting. The 1996 World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against DRM circumvention. The American implementation is the Digital Millennium Copyright Act(DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as rooting. The 2001European Copyright Directive implemented the treaty in Europe, requiring member states of the European Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as to run alternative software,[28] but member states vary on the implementation of the directive.

AustraliaEdit

In 2010, Electronic Frontiers Australia said that it is unclear whether rooting is legal in Australia, and that anti-circumvention laws may apply.[29] These laws were strengthened by the Copyright Amendment Act 2006.

CanadaEdit

In November 2012, Canada amended its Copyright Act with new provisions prohibiting tampering with digital locks, with exceptions including software interoperability.[30] Rooting a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.
There had been several efforts from 2008-2011 to amend the Copyright Act (Bill C-60, Bill C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,[31] but those bills were set aside. In 2011, Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.[32]

European UnionEdit

The Free Software Foundation Europe argues that it is legal to root or flash any device. According to the European Directive 1999/44/CE, replacing the original operating system with another does not void the statutory warranty that covers the hardware of the device for two years unless the seller can prove that the modification caused the defect.[33]

United KingdomEdit

The law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Rooting may be a form of circumvention covered by that law, but this has not been tested in court.[28][34] Competition laws may also be relevant.[35] See also "Europe" section above.

IndiaEdit

India's copyright law permits circumventing DRM for non-copyright-infringing purposes.[36][37] Indian Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.[38] India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US Special 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.[36][37]

New ZealandEdit

New Zealand's copyright law allows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes.[39][40] This law was added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment Act 2008.

SingaporeEdit

Rooting might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.[41]

United StatesEdit

Under the Digital Millennium Copyright Actrooting is illegal in the United States except by exemption. The U.S. Copyright Office currently grants phones an exemption to this law "at least through 2015".[42]
In 2010, in response to a request by theElectronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit rooting.[43][44] In their ruling, the Library of Congress affirmed on July 26, 2010 that rooting is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.
On October 28, 2012, the US Copyright Office updated their exemption policies. The rooting of smartphones continues to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.[45][46][47] The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.[46]
Tim Wu, a professor at Columbia Law School, argued in 2007 that jailbreaking is "legal, ethical, and just plain fun."[48] Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.[49] Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.[48] In 2010 and 2012, the U.S. Copyright Office approved exemptions to the DMCA that allow users to root their devices legally.[50] It is still possible to employ technical countermeasures to prevent rooting or prevent rooted phones from functioning.[51] It is also unclear whether it is legal to traffic in the tools used to make rooting easy.[51]
We will be seeing the post how to root any Android devices with cmd in the upcoming post .


Now let us see about ios that is ....king of smartphones - iphone

Jailbreaking is the process of removinghardware restrictions on iOSApple'soperating system, on devices running it through the use of software and hardwareexploits; such devices include the iPhone,iPod touchiPad, and second-generation Apple TV. Jailbreaking permits root access to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official Apple App Store.
Jailbreaking is a form of privilege escalation,[1][2] and the term has been used to describe privilege escalation on devices by other manufacturers as well.[3][4] The name refers to breaking the device out of its "jail",[5]which is a technical term used in Unix-style systems, for example in the term "FreeBSD jail". A jailbroken iPhone, iPod touch, or iPad running iOS can still use the App Store,iTunes, and other normal functions, such as making telephone calls.
Restoring a device with iTunes removes the jailbreak.





We will be seeing more about these in upcoming post...
stay tuned.... ;)





Time

Blogger TemplatesMy Blogger TricksAll Blogger Tricks

LIKE , SHARE AND TWEET

Contributors