生根始终如何? -- rooting 领域 和 linux 领域 和 bootloader 领域 android 相关 的问题

How is it that Rooting is always possible?





我的问题是:如何运送操作系统并不硬化?谁是负责的人?这是我们正在谈论的Linux操作系统,被认为是"安全" 。然而,人们总能找到进入和root设备的方法。


Having spent some time researching what actually goes behind rooting an Android phone, the main reason that leads to the ability root is an inherent vulnerability on the Linux kernel that leads to the exploit and getting the 'su' binary to be installed.

My question is: How come the OS is not hardened yet? Who is responsible? This is a Linux OS we're talking about, which is considered "secure". Yet, people always find a way to get in and root devices.




它不是"Linux操作系统" ,它是Linux内核。漏洞不一定在OS或内核中。使用不同的利用。我记得某些设备在恢复中加载任何zip文件,如果由签名的zip文件是"预先预先预先预先遵循" 。因此,它们使用符号zip并将无符号zip添加到文件的末尾。我认为这种漏洞是针对原来的机器人。





it's not really the "linux OS", it is the linux kernel. The vulnerability is not necessarily in the OS, or the kernel. There are different exploits that are used. I remember some device being able to load any zip file in the recovery if it was "pre-pended" by a signed zip file. So they used a signed zip and added an unsigned zip to the end of the file. I think this exploit was for the Original Droid.

No software is 100% bug free. if it was, then even a mature product like Windows would not have to do security patch releases every month.

No matter how smart the developer is, or thinks he is, more likely than not, there is probably someone smarter (or at least they may know more about exploiting code).

When exploits are discovered, Google (or the manufacturer) has (usually) patched them. But since a lot of the devices don't receive updates very often, the exploit remains available.


rooting始终是可能的,因为rooting,aka用户切换,aka setuid

对于许多设备,生根实际上并不涉及任何安全漏洞; rooting方法需要通过引导加载程序和/或rom更新程序实用程序(例如三星的Odin,HTC的RUU等)不是安全漏洞,因为它们是专门为闪烁roms设计的合法功能。以这种方式植根了大量设备。


实际上没有多种生根方法实际使用安全漏洞(例如 Rageagainstthecage , zergrush , gingerbreak 等),并且这些漏洞通常会重新包装成一种形式对于群众来说,更容易用于群众(例如Superoneclick)。通过漏洞利用源于击中并小姐,因为它们对仍然在更新期间的设备进行了相当快地修补;但有时它们提供优势,例如避免触发保修标记。



Rooting is always possible because rooting, a.k.a. user switching, a.k.a. setuid, is one of the most fundamental feature of Unix and Linux.

For many devices, rooting does not actually involve any security exploits; rooting methods that requires flashing a file through the bootloader and/or ROM updater utility (e.g. Samsung's Odin, HTC's RUU, etc) are not a security breach, as they are legitimate features specifically designed for flashing ROMs. A large number of devices are rooted in this way.

On those devices, rooting are possible because the manufacturers actually provides the facility for it. They certainly do not make rooting an easy one-click process (for good reasons; most people who wanted to root do not actually need root), but they do provide an officially sanctioned method to root under the condition that your warranty voids (official rooting method often leaves a permanent mark to let authorized technicians know if a phone had been rooted).

There are not that many quite a few rooting methods that actually uses a security exploits (e.g. rageagainstthecage, zergRush, gingerbreak, etc), and these exploits are often repackaged into a form that are much easier to use for the masses (e.g. SuperOneClick). Rooting through exploits are often hit and miss since they get patched fairly quickly for devices that are still within update period; but sometimes they provide advantages such as avoiding triggering the warranty marking.

The issue becomes a little complicated when the tech news and blogs reported when a developer wrote tutorials or tools to ease up legitimate rooting process. They often do not understand the nature of the rooting method, and certainly I have never seen them distinguish between legitimate rooting methods and rooting through security exploits, worse they also often report the repackaging of existing exploit and the porting of an existing exploit to a new device as if they're a totally different exploits. Thus the confusion that makes it appear that Android seems to have more exploits than it really does.



2  Superoneclick闪现了内核吗?  ( Does superoneclick flash a kernel ) 
是需要将内核闪存到手机root它,从而递增自定义内核柜台在三星Galaxy S2? ...

1  如何扎根于nexus 10没有擦拭?  ( How to root a nexus 10 without wipe ) 
我想root我的nexus 10而不擦除它的数据,所以我稍后可以安装ubuntu touch 上面。我该怎么做? ...

-1  对我来说是root我的S7 SM-G930F型号手机是安全的[复制]  ( Is it safe for me to root my s7 sm g930f model phone ) 
这个问题已经在这里有答案: rooting设备有风险吗? (6个答案) ...

143  生根有风险吗?  ( Are there any risks to rooting a device ) 
我看到了很多教程告诉我如何 root我的手机(摩托罗拉机器人),但其中没有一个潜在的"副作用" 。 除了几个似乎需要生根的些相对较小的问题之外,我基本上对手机很满意,因此有点搞砸了一个让我花费了很多钱的装置,只有几个月的时间。 假设我是只是谈论rooting,而且没有典型的后根动作(如安装自定义ROM),我是通过选择...

0  Unbrick三星Galaxy Core Prime SM-G360V  ( Unbrick samsung galaxy core prime sm g360v ) 
我需要知道如何un- softbrick 三星Galaxy核心素数。我不知道它是如何砖砌的,我刚才要求解决它。它看起来像一个bootloop问题。产品名称 sm-g360v 。我已经尝试使用ODIN3闪烁TWRP,但它失败说 SECURE CHECK FAIL : recovery 和下一行是 Custom Bina...

0  闪烁启动映像后的Android 10上丢失的所有者权限  ( Lost owner privileges on android 10 after flashing boot image ) 
似乎我的用户在Android上丢失了"所有者特权" :在UI中禁用了仅适用于主用户的任何功能或功能。不幸的是,这包括用户管理和所有备份功能。似乎我成为辅助用户,但我确实拥有原始主用户的数据。 是否有任何方法可以让所有者权限返回? 这发生在闪烁的Android 10的不同内核之后。我现在有正确的储备内核。 最好的问候!...

-3  我可以用另一个电话模型的官方ROM升级我的固件吗?使用Odin?  ( Can i upgrade my firmware with another phone models official rom using odin ) 
是否可以使用Odin使用其他电话模型的官方ROM升级我的手机固件? ...

9  rooting需要自定义rom吗?  ( Does rooting require a custom rom ) 
我注意到一些应用程序说他们需要一个扎根的手机。是否有必要安装自定义ROM以root手机? 编辑:我应该提到我见过这个回答,但我的手机未列出。 ...

0  生根和闪烁华为提升Y330  ( Rooting flashing huawei ascend y330 ) 
我有华为上升Y330,带有Android 4.2.2。我想知道root我的设备的最佳方法是什么,用更高的Android版本(如果可能的话)闪光自定义ROM的最佳方法是什么? 我在互联网上看到了很多链接,但所有这些都不是华为提升Y330。我看到了奇怪的指南如何将我的设备闪存到Android 5.0,但我不认为这是可能的...

493  如何root root我的Android设备?  ( How do i root my android device ) 
这是一个想要root手机的人提出的常见问题。我究竟是如何root root我的android设备?是否有风险? ...

0  华为在中国购买,无法访问Google Play(G510 T8951)  ( Huawei bought in china cant access google play g510 t8951 ) 
我在中国购买了这款华为手机,我无法访问谷歌商店。我可以通过百度商店访问一些应用,但其中一些不起作用,因为我没有谷歌播放服务。我试过通过百度商店安装它,它只是崩溃,并通过"谷歌下载者" (百度上的一个应用程序),现在谷歌播放推出但不连接(无连接)。 我不知道该怎么做,有什么想法? 我愿意root等......但没有考虑...

0  Realme 3 Pro粘在Bootloop(启动/恢复)被销毁  ( Realme 3 pro stuck at bootloop boot recovery has been destroyed ) 
嗨,我的手机处于启动循环 fastboot不起作用我已经尝试了每个按钮,但没有工作 没有连接到PIC /笔记本电脑也是如此 任何人都有解决方案请帮助 我确实用origanfox恢复闪现了我的股票rom。然后闪烁ROM后移动没有恢复,但FastBoot正在连接到PC。 我遵循这个 unbrick指南工作正常i执行8...

2  如何root我的ChinaVasion TechPad 7“平板电脑Android平板电脑?  ( How do i root my chinavasion techpad 7 tablet android tablet ) 
我有一个TechPad 7"平板电脑来自ChinaVience,S3C6410 Android 1.6; 都没有通用生根方法工作。 任何想法? ...

0  在中文三星注3上安装播放商店  ( Installing play store on chinese samsung note 3 ) 
我有一个汉语注3运行Android 4.3。它没有播放商店,击败了三星占据智能手机空间的一切。我无法下载gmail;我坚持使用百度搜索的浏览器;没有Facebook和Twitter。它几乎可以只是中国以外的一个大型手机。 我想询问如何安装播放商店并在设备上获取其他Google服务。我搜索了互联网,它总是告诉我root...

6  闪烁自定义ROM是否需要root访问权限?  ( Does flashing a custom rom require root access ) 
它最近带到了我的注意它没有。有人可以证实这一点并解释确定特征是什么决定是否需要闪存自定义ROM所需的根源? ...

© 2021 it.wenda123.org All Rights Reserved. 问答之家 版权所有

Licensed under cc by-sa 3.0 with attribution required.