Test USSD vulnerability on O4X - LG Optimus 4X HD

AFAIK our Optimus 4X is safe because its result only show dialer, but you should try it yourself.
If your phone is vulnerable to the recently disclosed tel: URL attack then this website will cause your phone to open the dialler and display the IMEI code. With other USSD codes it could do any number of other things, including wipe all phone data.
You can find some more information and a simple workaround here: http://dylanreeve.posterous.com/remote-ussd-attack
To test vulnerability, open this URL from your phone browser and wait for the effect:
http://dylanreeve.com/phone.php
What does it all mean?!
If visiting this page automatically causes your phone's dialler application to pop up with *#06# displayed then you are not vulnerable. If, however, the dialler pops up and then you immediately see your phone IMEI number (a 14- or 16-digit number) then you are potentially vulnerable to attack.
Sent from my LG-P880 using xda app-developers app

Related

App Requires Phone Number work around

I tried to install the verizon fios dvr manager/remote control - the application however requires a cell phone number - does any one know a work around to create a "fake number" on the nook to use these apps?
Thank you
xtrezpasor said:
I tried to install the verizon fios dvr manager/remote control - the application however requires a cell phone number - does any one know a work around to create a "fake number" on the nook to use these apps?
Thank you
Click to expand...
Click to collapse
I would also like to get something like this working for Google Voice so that I can use the messaging service.
Any and all help is appreciated.
I signed into my google account and google voice "just worked". Of course i can't make any calls but i can use it to send texts and receive texts sent to my gv number.
Sent from my LogicPD Zoom2 using XDA App
I think if you could lift the data/configuration from your existing phone then you could copy that to the Nook and be working. I could not find where the data was stored though for the app.
GarJones27 said:
I would also like to get something like this working for Google Voice so that I can use the messaging service.
Any and all help is appreciated.
Click to expand...
Click to collapse
I just entered my iPhone's number (which is already registered to Google Voice and has the Google Voice app on it) and I can use it for texting just fine.
KitF said:
I just entered my iPhone's number (which is already registered to Google Voice and has the Google Voice app on it) and I can use it for texting just fine.
Click to expand...
Click to collapse
Can you give a short tutorial on how to get this set up? I too (and im sure others) would like to be able to text from the Nook.
Sent from my HERO200 using XDA App
Setup gvoice on a phone first (you should able to find a tutorial by searching google). Then use the same # when setting up on the nook.
seeddemon said:
Setup gvoice on a phone first (you should able to find a tutorial by searching google). Then use the same # when setting up on the nook.
Click to expand...
Click to collapse
Edit: Okay, set up Google voice and I'm able to send texts using that number however the apps that require a phone number do not see it. Not a huge deal, but there might be more apps out there that require a phone number to work.
I simply set up Google voice via the Google.com/voice website. And then got a Google number to use for texts. In the voice app you can compose a message and my Google contacts are available.
Sent from my Nook Color.
This isnt what what I was looking for - I was looking for a way to use verizon Fios manager...
hijacked
I agree this thread was hijacked. We want a workaround for the Android verizon manager on the kindle fire or nook color where the app was meant for a mobile phone. Would there be a way to give a rooted device a phone number?
3EyedPhish said:
I agree this thread was hijacked. We want a workaround for the Android verizon manager on the kindle fire or nook color where the app was meant for a mobile phone. Would there be a way to give a rooted device a phone number?
Click to expand...
Click to collapse
Depending on the ROM your running, you may be able to enter a phone number in the settings.... otherwise you may be able to edit TelephonyManager.smali and find the section to pull the phone number and hard code a phone number in the same way we do IMEI edits.
DizzyDen said:
Depending on the ROM your running, you may be able to enter a phone number in the settings.... otherwise you may be able to edit TelephonyManager.smali and find the section to pull the phone number and hard code a phone number in the same way we do IMEI edits.
Click to expand...
Click to collapse
I got the FIOS app to run on my Nook by doing the reverse of this. I found the few places in the app where the phone number was looked up and replaced those by calls to get an apps prefs setting "Display Name" which is entered during set up but unused by the app. So I put in the phone number under Display Name during set up.
This was done using apktool to patch the app but I am reluctant to post the modified version as this is explicitly ruled out by license agreement.
I did consider going the TelephonyManager route but as I am using CM9 which is still changing quite a bit then that becomes a moving target. If CM9 puts explicit coded support in for entering a number like CM7 did then that would be the best option. I did find, however, when using the CM7 option that it had a tendency to lose the entered number during reboots.
You can set a phone number, IMEI, location and many other things for each individual app with PDroid without modifying any code on those apps.
All you need is to enable the PDroid framework. There are packages in Botbrew for Nook or you can use the auto-patcher if you have Linux.
The above links are for CM9. If you have cm7 there are auto-patchers for Linux and windows, which can be found at the PDroid thread.
mateorod said:
You can set a phone number, IMEI, location and many other things for each individual app with PDroid without modifying any code on those apps.
All you need is to enable the PDroid framework. There are packages in Botbrew for Nook or you can use the auto-patcher if you have Linux.
The above links are for CM9. If you have cm7 there are auto-patchers for Linux and windows, which can be found at the PDroid thread.
Click to expand...
Click to collapse
That looks like a better more general method. In checking this out I also notice that Verizon did do an update a couple of weeks ago where the FIOS remote app claims it has a new pairing method which works with non-phone tablets so maybe this isn't needed any more for this particular app. I'll try that out.
It is a pretty neat program, with a ton of functions and uses that go pretty unnoticed.
One note, though: due to an update in the CM repo, our auto-patcher ( and even the patches I used to make the auto-patcher) broke.
I have updated everything for CM9, but we are waiting on an aokp build before releasing another version of the auto-patcher.
But the Botbrew packages are up to date and can be used immediately for 5/08 and the patcher will be updated soon.
If you are running an older build, make sure the package you use matches the build date. And the auto-patcher still works to builds from 5/06 and earlier.
bobtidey said:
In checking this out I also notice that Verizon did do an update a couple of weeks ago where the FIOS remote app claims it has a new pairing method which works with non-phone tablets so maybe this isn't needed any more for this particular app. I'll try that out.
Click to expand...
Click to collapse
I tried out the new version of the Verizon app and it now does allow use of a 4 digit PIN as opposed to a phone number for setting up the remote control pairing. It finds the set top box OK but then immediately crashes on the Nook Color CM9.
I'm going to do a bit more investigation and maybe try it from a Touchpad to see if that behaves the same way.

Who like privacy must remove APR.apk

At least in wellcom rom was found APR.apk which i think from FOXCONN and provided uploading service for all log from our phone with IMEI.
So if you like privacy, trying minimize your internet traffic or using custom kernel I think better remove this app from /system/app/APR.apk
This app may send log with secret code *#*#268435456#*#*, may be exist and other method I don't look into all program logic

Security Bug

Security Bug Can Wipe Out Your Android Phone By Visiting a Web Page (Update 3)
Important update: It's not only Samsung with TouchWiz. Apparently it's happening with other Android phones too.
Here's how it works: the HTML frame loads a tel: URL. This url tells the telephone that its content is a clickable telephone number. However, instead of a phone number, the URL contains a special USSD code that tells the phone to wipe out itself. USSD means Unstructured Supplementary Service Data, special number sequences used by phone carriers to execute instructions in your phone.
We are vulnerable but...
ensboarder said:
Security Bug Can Wipe Out Your Android Phone By Visiting a Web Page (Update 3)
Important update: It's not only Samsung with TouchWiz. Apparently it's happening with other Android phones too.
Here's how it works: the HTML frame loads a tel: URL. This url tells the telephone that its content is a clickable telephone number. However, instead of a phone number, the URL contains a special USSD code that tells the phone to wipe out itself. USSD means Unstructured Supplementary Service Data, special number sequences used by phone carriers to execute instructions in your phone.
Click to expand...
Click to collapse
I have tested it and our phone is vulnerable (v20s rooted stock)...
To test if you are affected by this bug in your configuretion try load this page: goo(dot)gl/7H8CTI
if your IMEI shows up your phone is vulnerable...
A temporary fix is to install an app calles TelStop: play.google(dot)com/store/apps/details?id=org.mulliner.telstop
it works by intercepting the "tel:" link and opening up a warning...
Share the info
(Sorry for the links but i cannot publish link)
http://www.isk.kth.se/~rbbo/testussd.html
----------------------------------------------------------------------
arcee: the star, the galaxy R, and the grand X are completely different devices. different components, different resolutions, different radios, different audio amps,different panel manufacturers, different almost everything. The designs have nothing in common other than being T2
tonyp: so it's either LG or nothing?
arcee: yes
CM7.2 vulnerable too on O2X.
I just installed "NoTelURL" from Joerg Voss from Play Store. Save for now.
Yes, USSD codes are able to be launched from the browser, but that doesn't mean the O2X is vulnerable to the exploit.
Does the USSD that wipes Samsung phones even exist in stock and/or custom roms for the O2X?
Sent from my Optimus 2X using Tapatalk 2
kingvortex said:
Yes, USSD codes are able to be launched from the browser, but that doesn't mean the O2X is vulnerable to the exploit.
Does the USSD that wipes Samsung phones even exist in stock and/or custom roms for the O2X?
Sent from my Optimus 2X using Tapatalk 2
Click to expand...
Click to collapse
Good question!
Some USSD codes are uniqe for a manufacturer and some of them not
It looks like (im a novice) that THE code, factory reset, are samsung only code.
As example, dial *#06# and your IMEI pops up, thats used on every phone on every os. On android dial *#*#4636#*#*
You get the point
-Does that mean that i'm safe?
-No, you're not. Other LG and Android codes can be executed
-Is there any safe ROMs?
-I have only tried my link i posted earlier, with Benees hackfest (CM10). I'm safe.
If you dont pass the test, try another dialer. And please report back in this thread.
Edit: exDialer are an easy fix ( http://feber.se/android/art/252978/ett_klick_p_en_lnk_kan_terstll/ )
https://play.google.com/store/apps/details?id=com.modoohut.dialer
----------------------------------------------------------------------
arcee: the star, the galaxy R, and the grand X are completely different devices. different components, different resolutions, different radios, different audio amps,different panel manufacturers, different almost everything. The designs have nothing in common other than being T2
tonyp: so it's either LG or nothing?
arcee: yes
I am using Nova HD... Not safe
HerrKuk said:
Some USSD codes are uniqe for a manufacturer and some of them not
It looks like (im a novice) that THE code, factory reset, are samsung only code.
As example, dial *#06# and your IMEI pops up, thats used on every phone on every os. On android dial *#*#4636#*#*
You get the point
-Does that mean that i'm safe?
-No, you're not. Other LG and Android codes can be executed
-Is there any safe ROMs?
-I have only tried my link i posted earlier, with Benees hackfest (CM10). I'm safe.
If you dont pass the test, try another dialer. And please report back in this thread.
----------------------------------------------------------------------
arcee: the star, the galaxy R, and the grand X are completely different devices. different components, different resolutions, different radios, different audio amps,different panel manufacturers, different almost everything. The designs have nothing in common other than being T2
tonyp: so it's either LG or nothing?
arcee: yes
Click to expand...
Click to collapse
kingvortex said:
Yes, USSD codes are able to be launched from the browser, but that doesn't mean the O2X is vulnerable to the exploit.
Does the USSD that wipes Samsung phones even exist in stock and/or custom roms for the O2X?
Sent from my Optimus 2X using Tapatalk 2
Click to expand...
Click to collapse
Code i have tested working
​*#06# >IMEI
#*#4636#*#* > Test Menu
1809#*990# >Hidden Menu
*#*#8255#*#* >Gtalk service​
iosonogerva said:
Code i have tested working
​*#06# >IMEI
#*#4636#*#* > Test Menu
1809#*990# >Hidden Menu
*#*#8255#*#* >Gtalk service​
Click to expand...
Click to collapse
But attackers wouldn't benefit from launching those things on our phone as only we can see the results. Hopefully we don't find something triggering a wipe.
i tried that and my phone don't show anything??
Does this affect stock LG ? may be then it will cause them to roll out an update sooner...

Remote Wipe Vulnerability

Hi Guys, the browser hack that wipes Samsung phones is not limited to just those handsets. These guys do a better job of describing the whole thing:
http://www.theverge.com/2012/9/26/3412432/samsung-touchwiz-remote-wipe-vulnerability-android-dialer
Here is a direct link to the exploit test:
http://dylanreeve.com/phone.php
I'm running MavRom4 with the China telco radio image and my device is vulnerable. Just wanted to share the info so people are aware; having two dialers and no default will force the exploit to ask you to actively pick a dialer; this would neutralize most cases but that is a pretty annoying work around.
Maybe people can post D3 Roms that aren't vulnerable.
majatt said:
I'm running MavRom4 with the China telco radio image and my device is vulnerable. Just wanted to share the info so people are aware; having two dialers and no default will force the exploit to ask you to actively pick a dialer; this would neutralize most cases but that is a pretty annoying work around.
Click to expand...
Click to collapse
Also, installing DialerOne and making it the default will protect you as well - you do not have to leave it without a default dialer set. DialerOne is actually a good dialer - I used to use it with my Droid Eris with CyanogenMod ROMs, in order to have the dial by name function that the Sense dialer supported back. And you can still leave the stock dialer set in a home page or on the launcher dock - it will still work if you call it up. It will not be called up if you launch the dialer from another app, though, if you make DialerOne the default.
The stock dialer is vulnerable - a predictable result, based on the vulnerability of MavRom, but I did want to say that I tested it. I haven't tested any other ROM - at this point, I don't have much time to try some out, and I think I recently deleted my most recent Liberty and Bionic Nandroid backups.
Let's see how long before Moto releases a critical patch update for stock.
Thanks, this is good to know. I thought it was only Samsung phones that had the issue, but since I'm still on stock 2.3.4 it appears I'm vulnerable. I have GrooveIP Lite installed on my phone, an app that allows you to make voice calls with using your Google Voice number. With this app installed I get a complete action using Dialer or GrooveIP window so I should be safe if I get a random popup Ill be sure to not select Dialer.
I heard about this "wipe" problem and when I saw it was just passing dialer codes to the fone I knew it would affect more than just Samsung.
Does anyone know if they have a list started of fones that might be vulnerable?
I read somewhere (though haven't tested it...) that the D3 does not have a dialer code that resets the phone, as the Samsung phones do/did. So, the D3 fails the display the IMEI test, but I believe that the reset code does not work with the D3.
FYI: CM10 kexec isn't vulnerable. Probably b/c it's JB (I think they fixed the vulnerability in JB). I go to the site and dialer pops up w/ *#06# No IMEI displayed
Sent from my AOKP JB GT-P3113 using Tapatalk

[Info] Secret codes for Android

Hiii friends, today I’m sharing a collection of secret codes for Android smart phones....
These codes will be very useful for all Android Users....
HIT THANKS IF YOU LIKE MY WORK....
DISCLAIMER: I 'll not be responsible for the use or misuse of this information, including loss of data or hardware damage. So use it at your own risk.
1. Complete Information About your Android Phone
*#*#4636#*#*
This code can be used to get some interesting information about your phone and battery. It shows complete Phone Information, Battery history, Battery information (voltage, battery life, status etc) and phone usage statistics
2. Phone Camera Update
*#*#34971539#*#*
This code is used to get information about phone camera. It shows following 4 menus:. Update camera firmware in image (Don’t try this option), Update camera firmware in SD card, Get camera firmware version and Get firmware update count
WARNING: Never use the first option otherwise your phone camera will stop working and you’ll need to take your phone to service center to re install camera firmware.
3. Format Android Phone
*2767*3855#
Think before you try this code. This code is used for factory format. It will remove all files and settings including the internal memory storage. It’ll also re install the phone firmware.
Note: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.
4. Factory data reset
*#*#7780#*#*
This code can be used for a factory data reset. It’ll remove Google account settings stored in your phone, Downloaded applications, System and application data and settings. But It’ll not remove current system software and bundled application, SD card files. Once you give this code, you get a prompt screen asking you to click on “Reset phone” button. So you get a chance to cancel your operation.
5. End Call/Power
*#*#7594#*#*
This code can be used to change the “End Call / Power” button action in your phone. Be default, if you long press the button, it shows a screen asking you to select any option from Silent mode, Airplane mode and Power off. You can change this action using this code. You can enable direct power off on this button so you don’t need to waste your time in selecting the option.
6. File Copy for Creating Backup
*#*#273283*255*663282*#*#*
This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.
7. SERVICE MODE
*#*#197328640#*#*
This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.
8. WLAN, GPS and Bluetooth Test Codes:
•*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#*– WLAN test (Use “Menu” button to start various tests)
•*#*#232338#*#*– Shows WiFi MAC address
•*#*#1472365#*#*– GPS test
•*#*#1575#*#*– Another GPS test
•*#*#232331#*#*– Bluetooth test
•*#*#232337#*# – Shows Bluetooth device address
9. Codes to get Firmware version information:
•*#*#4986*2650468#*#* – PDA, Phone, H/W, RFCallDate
•*#*#1234#*#* – PDA and Phone
•*#*#1111#*#* – FTA SW Version
•*#*#2222#*#* – FTA HW Version
•*#*#44336#*#* – PDA, Phone, CSC, Build Time, Changelist number
10. Codes to launch various Factory Tests:
•*#*#0283#*#* – Packet Loopback
•*#*#0*#*#* – LCD test
•*#*#0673#*#* OR *#*#0289#*#* – Melody test
•*#*#0842#*#* – Device test (Vibration test and BackLight test)
•*#*#2663#*#* – Touch screen version
•*#*#2664#*#* – Touch screen test
•*#*#0588#*#* – Proximity sensor test
•*#*#3264#*#* – RAM version (You can increase any android device RAM upto 4GB, Check it now)
11. Other Useful Codes
•* #1234# - Check Software version of the device
•*#12580*369# - Check software and hardware information.
•*#0228# - Check Battery status (ADC, RSSI reading)
•*#32489#- Service mode
If you know any secret codes other than above listed, share it on comment section..
COMMENT FREELY...
Reserved
*#06# - imei code
Sent from my BL-S5570 using xda app-developers app
Make this sticky...
Sent from my GT-S5570 using Tapatalk 2
fdr1234 said:
Sent from my GT-S5570 using xda app-developers app
Click to expand...
Click to collapse
Don't copy OP first post, edit your post.
Sent from my BL-S5570 using xda app-developers app
Man.. most of it doesn't work on Cyanogen on my device. It kind of tries to work, but doesn't
Sent from my HTC Explorer A310e using xda app-developers app
I know right.It doesn't work on idroid too:thumbup:
Sent from GALAXY mini...Please Thank Me when you think I deserve it
Awesome list
Theawesomeguy4 said:
Hiii friends, today I’m sharing a collection of secret codes for Android smart phones....
These codes will be very useful for all Android Users....
HIT THANKS IF YOU LIKE MY WORK....
DISCLAIMER: I 'll not be responsible for the use or misuse of this information, including loss of data or hardware damage. So use it at your own risk.
1. Complete Information About your Android Phone
*#*#4636#*#*
This code can be used to get some interesting information about your phone and battery. It shows complete Phone Information, Battery history, Battery information (voltage, battery life, status etc) and phone usage statistics
2. Phone Camera Update
*#*#34971539#*#*
This code is used to get information about phone camera. It shows following 4 menus:. Update camera firmware in image (Don’t try this option), Update camera firmware in SD card, Get camera firmware version and Get firmware update count
WARNING: Never use the first option otherwise your phone camera will stop working and you’ll need to take your phone to service center to re install camera firmware.
3. Format Android Phone
*2767*3855#
Think before you try this code. This code is used for factory format. It will remove all files and settings including the internal memory storage. It’ll also re install the phone firmware.
Note: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.
4. Factory data reset
*#*#7780#*#*
This code can be used for a factory data reset. It’ll remove Google account settings stored in your phone, Downloaded applications, System and application data and settings. But It’ll not remove current system software and bundled application, SD card files. Once you give this code, you get a prompt screen asking you to click on “Reset phone” button. So you get a chance to cancel your operation.
5. End Call/Power
*#*#7594#*#*
This code can be used to change the “End Call / Power” button action in your phone. Be default, if you long press the button, it shows a screen asking you to select any option from Silent mode, Airplane mode and Power off. You can change this action using this code. You can enable direct power off on this button so you don’t need to waste your time in selecting the option.
6. File Copy for Creating Backup
*#*#273283*255*663282*#*#*
This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.
7. SERVICE MODE
*#*#197328640#*#*
This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.
8. WLAN, GPS and Bluetooth Test Codes:
•*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#*– WLAN test (Use “Menu” button to start various tests)
•*#*#232338#*#*– Shows WiFi MAC address
•*#*#1472365#*#*– GPS test
•*#*#1575#*#*– Another GPS test
•*#*#232331#*#*– Bluetooth test
•*#*#232337#*# – Shows Bluetooth device address
9. Codes to get Firmware version information:
•*#*#4986*2650468#*#* – PDA, Phone, H/W, RFCallDate
•*#*#1234#*#* – PDA and Phone
•*#*#1111#*#* – FTA SW Version
•*#*#2222#*#* – FTA HW Version
•*#*#44336#*#* – PDA, Phone, CSC, Build Time, Changelist number
10. Codes to launch various Factory Tests:
•*#*#0283#*#* – Packet Loopback
•*#*#0*#*#* – LCD test
•*#*#0673#*#* OR *#*#0289#*#* – Melody test
•*#*#0842#*#* – Device test (Vibration test and BackLight test)
•*#*#2663#*#* – Touch screen version
•*#*#2664#*#* – Touch screen test
•*#*#0588#*#* – Proximity sensor test
•*#*#3264#*#* – RAM version (You can increase any android device RAM upto 4GB, Check it now)
11. Other Useful Codes
•* #1234# - Check Software version of the device
•*#12580*369# - Check software and hardware information.
•*#0228# - Check Battery status (ADC, RSSI reading)
•*#32489#- Service mode
If you know any secret codes other than above listed, share it on comment section..
COMMENT FREELY...
Click to expand...
Click to collapse
Man, you've made an awesome list. Any code to check battery stats?
Not work for my phone :thumbup:
Sent from my GT-S5570 using xda premium
rudisans said:
Not work for my phone :thumbup:
Sent from my GT-S5570 using xda premium
Click to expand...
Click to collapse
It's only for stock rom
Sent from my BL-S5570 using xda app-developers app
Is there a code to refresh wifi that works on 2.3.7 and up?
Sent from a nail cutter.

Categories

Resources