galaxy S21+ 5g - Introductions

I'm looking for a way to get this device out of retail demo mode... i found the switch but it prompted me for an authoritization passcode. does anybody have something like a script i can download from the device or plug into my computer and run a thing that bypasses that request? I'm not a hacker and this is an ethical modification to make a very nice device a useable mobile. thanks I'm Justho by the way. nice to meet everybody, thanks for reading my post!

hobottrillionaire139 said:
I'm looking for a way to get this device out of retail demo mode... i found the switch but it prompted me for an authoritization passcode. does anybody have something like a script i can download from the device or plug into my computer and run a thing that bypasses that request? I'm not a hacker and this is an ethical modification to make a very nice device a useable mobile. thanks I'm Justho by the way. nice to meet everybody, thanks for reading my post!
Click to expand...
Click to collapse
This violates an ethical and legal boundary as the device is most likely stolen. I cannot imagine any other way that a device would be locked in demo mode but please share your story and prove us otherwise.

Related

[Q] Blocking Smart phone readers

Has anyone seen in the news the electronic readers the government is using which is capable of illegally stealing all private information from any type of smart phone?
Can anybody create a mod that will block a device like this from being used on the Nexus one?
http://www.prisonplanet.com/cops-us...l-cellphone-data-from-innocent-americans.html
Do you really believe what you read?
Say, 16GB of photos&data on iPhone, 1.5 minutes, count required transfer rate - quite simple - and then tell me, what kind of wireless connectivity does this "device" use to "steal data from unsuspecting people"?
Then ask yourself the first question again.
Now, if you look up the stated device's manufacturer site, http://www.cellebrite.com/forensic-products.html, you'll see that even in their photos it's perfectly clear this device has to be connected by wire to the phone. Does anyone in their right mind willingly connect the phone by USB to some device with unknown functionality? In that case, no, the data can't be protected.
Now, if you go even one more step further, and open the "supported devices" catalog on the site, you'll see that the only thing that can be done wireless to the iPhone is extracting phonebook - and I'm not sure about the requirement to allow the BT connection - but if you look up Nexus One, you'll see that it definitely has to be attached by wire to do anything with it.
And now back to the first question: do you believe everything you read?
Jack_R1 said:
Do you really believe what you read?
Say, 16GB of photos&data on iPhone, 1.5 minutes, count required transfer rate - quite simple - and then tell me, what kind of wireless connectivity does this "device" use to "steal data from unsuspecting people"?
Then ask yourself the first question again.
Now, if you look up the stated device's manufacturer site, http://www.cellebrite.com/forensic-products.html, you'll see that even in their photos it's perfectly clear this device has to be connected by wire to the phone. Does anyone in their right mind willingly connect the phone by USB to some device with unknown functionality? In that case, no, the data can't be protected.
Now, if you go even one more step further, and open the "supported devices" catalog on the site, you'll see that the only thing that can be done wireless to the iPhone is extracting phonebook - and I'm not sure about the requirement to allow the BT connection - but if you look up Nexus One, you'll see that it definitely has to be attached by wire to do anything with it.
And now back to the first question: do you believe everything you read?
Click to expand...
Click to collapse
But, it's on the internet, why would the internet lie? Are you calling the internet a liar?
I believe that if you soak your phone in warm, salty water overnight it will block this device - haven't tried though, so I can't confirm...
Umm... those Cellebrite devices are very real, and Michigan police are/were using them. The have the ability to pull the data off of thousands of different types of phones, over USB. I've never see Android specifically listed on their site, but I'd be willing to bet their devices can pull data from Android too.
That being said, I can't believe people are handing over their phones. This whole thing stinks of illegal search and seizure. But, they're getting away with it by saying the person willingly handed over their phone (even though I'd bet they're being coerced), There would be absolutely no way I'd hand my phone over to any LEO with out seeing a warrant first.
I was just mulling this over in my head... and I think the only way to block something like this would be to disable the data port on the phone. What that would involve from a software stand-point, I have no idea, and may not even be possible with how the hardware/software is designed... but that is basically the only way I'd see it to be possible.
Removing the USB driver (device functions) from the kernel would be enough, I believe.
In order for adb to work, you have to enable usb debugging. Wouldn't that be a requirement with this device, also?
ok just because I pulled this from prison planet doesn't mean its not true, it was the most convenient link at the time and hours later it was on front page of yahoo and all the major news sites. it would be easy for a police man to take your phone from you and hook it up to whatever they want.
Yep, saw it tonight on NBC Nightly News with Brian Williams. Looks scary with some cops not using warrants to get your phone on a traffic stop...

[Q] Security question: Phones and Intelligence Firm Visits

*Assume the phone in question is rooted and s-off*
Scenario: A person is invited to the HQ of a very successful and prominent intelligence firm by one of the highest ranking advisors in the firm. The purpose of the invite is unknown to this person, although it isn’t a place like Google so they aren’t exactly in the business of just giving out tours for friends. It’s possible that lucrative employment may be an option. Assume that buying a prepaid phone for the visit is not an option, and that the phone does not leave the custody of the person at any time during the visit.
Question: Is it possible to push anything to the phone (a program or script for example) which would survive a complete wipe followed by a nandroid restore (backed up before the visit takes place) when only the following is enabled (no NFC, Bluetooth, or Wifi):
-Data/radio
-Radio
-Airplane mode
Thank you very much for your time on this.
prospect7 said:
*Assume the phone in question is rooted and s-off*
Scenario: A person is invited to the HQ of a very successful and prominent intelligence firm by one of the highest ranking advisors in the firm. The purpose of the invite is unknown to this person, although it isn’t a place like Google so they aren’t exactly in the business of just giving out tours for friends. It’s possible that lucrative employment may be an option. Assume that buying a prepaid phone for the visit is not an option, and that the phone does not leave the custody of the person at any time during the visit.
Question: Is it possible to push anything to the phone (a program or script for example) which would survive a complete wipe followed by a nandroid restore (backed up before the visit takes place) when only the following is enabled (no NFC, Bluetooth, or Wifi):
-Data/radio
-Radio
-Airplane mode
Thank you very much for your time on this.
Click to expand...
Click to collapse
Lol this is a little paranoid imo but also very interesting. How could your radio and data be enabled with airplane mode at the same time? I would also say that this isn't specifically related to the HTC ONE but more related to Android in general. Maybe you should ask your special question here
Yes, it is possible. They put up a rogue cell site, your phone connects to it, and they are in control of any data sent / received to the device.
cschmitt said:
Yes, it is possible. They put up a rogue cell site, your phone connects to it, and they are in control of any data sent / received to the device.
Click to expand...
Click to collapse
How the device will connect to that rogue cell site with airplane mode activated?
I love that poem mate! :good: in your signature lol ''Ode to the Noob''
Thanks, both of you, I'll post this to the forum you mentioned, alray.
Paranoid yes, but if you've followed the intelligence community closely, it's not so much paranoia as precaution. Trust me, I won't go blame it on aliens, hahaha.
To answer your question, alray: Information has been made public to show that hardware level surveillance is possible on electronic devices and there are devices used to do this. Granted, it's rare, but I figured I'd leave it open ended to see if someone knew something I didn't.

Work will supposedly start denying access to the wifi to rooted/jailbroken devices

So yeah, assuming their efforts is successful and they manage to set up their wifi to deny access to rooted devices, is there anyway around this without unrooting?
Apoplectic1 said:
So yeah, assuming their efforts is successful and they manage to set up their wifi to deny access to rooted devices, is there anyway around this without unrooting?
Click to expand...
Click to collapse
There used to be a module called Root Cloack(er) for Xposed frameworks that hides root, don`t know if there is a version for Marsmellow though. Its here on the XDA forums somewhere.
But how? I can't think of any way to detect a rooted/jailbroken phone from a Wifi connection, without you having to install or run some other piece of software/script that would give them that information.
revrenhex said:
But how? I can't think of any way to detect a rooted/jailbroken phone from a Wifi connection, without you having to install or run some other piece of software/script that would give them that information.
Click to expand...
Click to collapse
I'm not sure. I would not put it past my company to make us install such a script in order to access wifi.
Many places are doing this. Detecting root is simple. Even Snapchat and others are doing it. Heck they are even looking for xposed and won't work if detected.
You would be amazed at what info people can get from your device when it's connected to wifi
zelendel said:
Many places are doing this. Detecting root is simple. Even Snapchat and others are doing it. Heck they are even looking for xposed and won't work if detected.
You would be amazed at what info people can get from your device when it's connected to wifi
Click to expand...
Click to collapse
a lot of info sure... But an app running on your phone detecting it, vs detecting that something is installed simply by connecting to their network? Your phone passes along a lot of info... but not installed binaries?
I could see them maybe having a black list, like if you're connecting the the exposed repositories your likely rooted... but if you are not using programs that require root access and communicate over the network, how are they doing this?
scryan said:
a lot of info sure... But an app running on your phone detecting it, vs detecting that something is installed simply by connecting to their network? Your phone passes along a lot of info... but not installed binaries?
I could see them maybe having a black list, like if you're connecting the the exposed repositories your likely rooted... but if you are not using programs that require root access and communicate over the network, how are they doing this?
Click to expand...
Click to collapse
A simple request for the info. Have you ever looked at a logcat and saw everything running. I could be gone for weeks and come home and tell you every device that has ever connected to my network the whole time I was gone and with the right things in place could even tell if they are rooted or jailbroken
I can see the same as the poster above me on our network, it is not hard at all. And if we had such a policy and you used a cloaker I would have you fired.
Their network, their rules. I really don't think you should do this.
zelendel said:
A simple request for the info. Have you ever looked at a logcat and saw everything running. I could be gone for weeks and come home and tell you every device that has ever connected to my network the whole time I was gone and with the right things in place could even tell if they are rooted or jailbroken
Click to expand...
Click to collapse
Can you provide any links or further detail? Obviously by viewing system logs you can tell whats running.... but I have never seen any standard network function to request a connected device to send logs without permission? Google searching the topic provides little info as its saturated with info on how to root, and using root for ad blocking.
Even a brief overview of the setup you would use to check? What are "the right things" and what "place" would the need to be in?
scryan said:
Can you provide any links or further detail? Obviously by viewing system logs you can tell whats running.... but I have never seen any standard network function to request a connected device to send logs without permission? Google searching the topic provides little info as its saturated with info on how to root, and using root for ad blocking.
Even a brief overview of the setup you would use to check? What are "the right things" and what "place" would the need to be in?
Click to expand...
Click to collapse
I wont get into it too deeply as I have my guys that watch this site as well and If they go around my security setup like with exchange pin request or using some devices on my network I will fire them on the spot. Lets just say the router logs everything that is done on the network. Connect your device to your wifi and then watch a logcat. You should be able to see what you are looking for.
Understand that unless approved by me no device can connect to my network. With the right router you can see everything about a device. you wont find much info on google as things like this are kept close to the chest with the IT crowd
zelendel said:
I wont get into it too deeply as I have my guys that watch this site as well and If they go around my security setup like with exchange pin request or using some devices on my network I will fire them on the spot. Lets just say the router logs everything that is done on the network. Connect your device to your wifi and then watch a logcat. You should be able to see what you are looking for.
Understand that unless approved by me no device can connect to my network. With the right router you can see everything about a device. you wont find much info on google as things like this are kept close to the chest with the IT crowd
Click to expand...
Click to collapse
No one here is trying to connect to your network. It's XDA and people are curious. I agree that it's silly to circumvent measures used by the company you work for (assuming you want to keep working there), but I also find it strange that you connect to a network and have that router, etc tell if your phone has a specific binary and apk. Is that what you are claiming happens?
gee2012 said:
There used to be a module called Root Cloack(er) for Xposed frameworks that hides root, don`t know if there is a version for Marsmellow though. Its here on the XDA forums somewhere.
Click to expand...
Click to collapse
This is not possible to limit an android version via network traffic, the best they could do is catch you updating cyanogenmod and ban your mac by guessing that your rooted, but its so much work, its a bunch of empty threats.
mwalt2 said:
No one here is trying to connect to your network. It's XDA and people are curious. I agree that it's silly to circumvent measures used by the company you work for (assuming you want to keep working there), but I also find it strange that you connect to a network and have that router, etc tell if your phone has a specific binary and apk. Is that what you are claiming happens?
Click to expand...
Click to collapse
It can yes. And you are right this is XDA but you would be amazed at what info is not shared here or anywhere except between IT managers or other devs.
Once connected to a network it is not that hard to get everything from a device. This is why all the warnings about connecting to open networks. While Open networks are more of a risk it goes to show that anything can be done.
This has been a practice for a very long time even back to the WM days when roms encluded time bombs that would make the rom not work after a set time and date.
zelendel said:
It can yes. And you are right this is XDA but you would be amazed at what info is not shared here or anywhere except between IT managers or other devs.
Once connected to a network it is not that hard to get everything from a device. This is why all the warnings about connecting to open networks. While Open networks are more of a risk it goes to show that anything can be done.
This has been a practice for a very long time even back to the WM days when roms encluded time bombs that would make the rom not work after a set time and date.
Click to expand...
Click to collapse
It's all smoke and mirrors to me until someone explains how it's possible to read files on a device by a user just connecting to a network and providing no further interaction. Sure you can get the device MAC, name, etc, but that's not how I read your statements. As mentioned in the post above yours, you can guess on network traffic, etc, but I really doubt anyone can "know everything".
Loved the HTC Diamond and TP2 [emoji1]
mwalt2 said:
It's all smoke and mirrors to me until someone explains how it's possible to read files on a device by a user just connecting to a network and providing no further interaction. Sure you can get the device MAC, name, etc, but that's not how I read your statements. As mentioned in the post above yours, you can guess on network traffic, etc, but I really doubt anyone can "know everything".
Loved the HTC Diamond and TP2 [emoji1]
Click to expand...
Click to collapse
Its not guessing network traffic. You can tell exactly what sites they go to. You can tell if they are using a mobile or desktop browser. (same way the carriers do it to prevent teethering)
All it takes is being connected to a network to be infected with a virus. Just how do you think that happens?
No one is gonna explain it. Just like we dont allow talks about network penetration. There are just something that are best not out in public view.
Here is an older example of how they detected jailbroken iphones on school networks.
zelendel said:
Its not guessing network traffic. You can tell exactly what sites they go to. You can tell if they are using a mobile or desktop browser. (same way the carriers do it to prevent teethering)
All it takes is being connected to a network to be infected with a virus. Just how do you think that happens?
No one is gonna explain it. Just like we dont allow talks about network penetration. There are just something that are best not out in public view.
Click to expand...
Click to collapse
I am specifically referring to detecting that a binary and an apk exist on a device SOLELY based on establishing a network connection (not viruses, not websites visited...user does nothing and no new code/software runs on the device). That does not seem probable to me.
It may just be semantics, but that's how I interpreted your original statement.
Of course network admins can see what sites users visit, what browser they use, etc and there is no guessing - only logs [emoji3]. I was using guessing in different sense (ie, you see something "suspicious" and draw conclusions).
Wow.... if i ever get fired after i found out they are 'reading' files on my device... this will be case for a courtn no doubt! I'm sure (at least where i live) the one that fires you based on such actions will have a big problem!
mwalt2 said:
I am specifically referring to detecting that a binary and an apk exist on a device SOLELY based on establishing a network connection (not viruses, not websites visited...user does nothing and no new code/software runs on the device). That does not seem probable to me.
It may just be semantics, but that's how I interpreted your original statement.
Of course network admins can see what sites users visit, what browser they use, etc and there is no guessing - only logs [emoji3]. I was using guessing in different sense (ie, you see something "suspicious" and draw conclusions).
Click to expand...
Click to collapse
If you read the link they showed how to detect cydia which showed them it was jailbroken. The same thing can be done on android.
Droidphilev said:
Wow.... if i ever get fired after i found out they are 'reading' files on my device... this will be case for a courtn no doubt! I'm sure (at least where i live) the one that fires you based on such actions will have a big problem!
Click to expand...
Click to collapse
You would lose. When you agree to use their network you agree to all their rules. This is the main reason for things like Knox. As more and more place move to a "right to work" setup where they dont need a reason to fire you at all. I would be careful about what rules one does break. Gone are the days where we could get away with things like this.
You know this got me thinking. Maybe I will play around with my network and see what I can find out. I have to block root and xposed users anyway so this would be a great challenge. Might be awhile as I revert all my PC back to windows 7.
From an IT perspective, a rooted device provides little to no security. That's why most mobile device management (MDM) products include a feature that let IT block rooted devices from connecting to the secure network or accessing corporate assets. But these products must be able to detect rooted devices before they can block them, and there are ways users can get around those detection mechanisms. Organizations that rely on MDM alone to detect rooted devices should be aware of these limitations.
http://searchmobilecomputing.techta...evice-risks-include-network-access-data-theft
zelendel said:
If you read the link they showed how to detect cydia which showed them it was jailbroken. The same thing can be done on Android.
Click to expand...
Click to collapse
I didn't see a link in Tapatalk or Chrome mobile. As for me, I see no reason why I'd ever want to connect my personal smartphone to my work network. Thanks for the discussion.
zelendel said:
...snip...
Click to expand...
Click to collapse
You made me VERY curious! I will try to call HR department of the company i work for today to ask how this works for us
If i get fired because of this phonecall i will try to get you fired for making me curious

I have a blank canvas to work with, people!

Hi everyone,
Long time reader, first time poster. This website really is the best source for all your galaxy needs. I learned how to root my first Android, a galaxy S4 here. Anyways, I'm here because I have scoured the internet trying to find a certain ROM that it seems no one has made.
I have a Galaxy S6 Active. recently, I lost service with AT&T, and I want to install a custom ROM on it. Here's the things though. This is no longer an AT&T phone. I don't care about KNOX, or if I can make or receive phone calls on it. I want to turn it into smething completely different. Linux OS, perhaps. Just an external hard drive. If I had to put a name on what I'm trying to find, it would be "NFC device with bluetooth and WIFI capabilities". I hope I'm explaining myself clearly. It's no longer a phone to me, but a blank canvas I can tweak and morph into something completely new.
Lmao good luck. Root.bounty @ $1550
ThegoLopez said:
Hi everyone,
Long time reader, first time poster. This website really is the best source for all your galaxy needs. I learned how to root my first Android, a galaxy S4 here. Anyways, I'm here because I have scoured the internet trying to find a certain ROM that it seems no one has made.
I have a Galaxy S6 Active. recently, I lost service with AT&T, and I want to install a custom ROM on it. Here's the things though. This is no longer an AT&T phone. I don't care about KNOX, or if I can make or receive phone calls on it. I want to turn it into smething completely different. Linux OS, perhaps. Just an external hard drive. If I had to put a name on what I'm trying to find, it would be "NFC device with bluetooth and WIFI capabilities". I hope I'm explaining myself clearly. It's no longer a phone to me, but a blank canvas I can tweak and morph into something completely new.
Click to expand...
Click to collapse
Take some time to use the "search" function :') there is no root for this phone so your stuck with Stock rom until root is available
ryanraven said:
Take some time to use the "search" function :') there is no root for this phone so your stuck with Stock rom until root is available
Click to expand...
Click to collapse
Trust me, I did. There are so many cool ROMS out there. I guess what I'm not understanding is....well... why?
So, a cell phone (if you can even call it that any more, lol) is a piece of hardware with software on it. If I remove ALL of the software from it, Everything... even ODIN. Aren't I left with something similar to a laptop with a formatted hard drive?Can't I put something like an MBR on it and start from scratch? That's what I'm looking for. Not some program that can simulate kit kat or lollipop. I want something that will wipe it down to where all I see on the screen is a flashing C:\
ThegoLopez said:
Trust me, I did. There are so many cool ROMS out there. I guess what I'm not understanding is....well... why?
So, a cell phone (if you can even call it that any more, lol) is a piece of hardware with software on it. If I remove ALL of the software from it, Everything... even ODIN. Aren't I left with something similar to a laptop with a formatted hard drive?Can't I put something like an MBR on it and start from scratch? That's what I'm looking for. Not some program that can simulate kit kat or lollipop. I want something that will wipe it down to where all I see on the screen is a flashing C:\
Click to expand...
Click to collapse
I don't think you understand how these phones work, you could indeed somehow wipe all the partition of the phone in Odin which if you didn't know isn't part of the phone but a computer program, but if your clever enough to build an OS by yourself to run on the phone then Thumbs Up! & you'd need to unlock the phones bootloader and have very expensive hardware and software to even get into this phone, your idea is good but impossible sorry to burst your bubble my friend.
ryanraven said:
I don't think you understand how these phones work, you could indeed somehow wipe all the partition of the phone in Odin which if you didn't know isn't part of the phone but a computer program, but if your clever enough to build an OS by yourself to run on the phone then Thumbs Up! & you'd need to unlock the phones bootloader and have very expensive hardware and software to even get into this phone, your idea is good but impossible sorry to burst your bubble my friend.
Click to expand...
Click to collapse
mind=blown. OK, so that is something I was not aware of. So, to try and understand it better, that is like me trying to login to my laptop's BIOS and it having password protection that only Dell knows the code to?
ThegoLopez said:
mind=blown. OK, so that is something I was not aware of. So, to try and understand it better, that is like me trying to login to my laptop's BIOS and it having password protection that only Dell knows the code to?
Click to expand...
Click to collapse
Yep, pretty much. Except in this case, it's both Samsung and AT&T's business agreements that have it locked down. Until someone cracks it, or they unlock it, we're all in a holding pattern.
chrisliphart said:
Y...it's both Samsung and AT&T's business agreements that have it locked down. Until someone cracks it, or they unlock it...
Click to expand...
Click to collapse
Yes, big business definitely has us at their mercy. Plus I heard a rumor that the guy who unlocked the previous bootloader now works for them.
So, how would one, with only ODIN, a USB cable, an internet connection, and alot of time on their hands, go about trying to unlock this bootloader? I mean, I know there are many people out there who are WAY more qualified than me and have way better equipment. But, hey, I could do it. I'm coming into this with no frame of reference or previous experience. Meaning I have the ability to see the problem from a perspective that no one ever has before. Who knows... and I can't fail if I never even try

Noob question on Note 9

Hello everyone,
I'm Noob to this territory and been searching the web to no end, but with little results.
Long story short, I have a Note9 that I'm trying to get into, this is my old phone i have upgraded to an S20, the phone had a encrypted pin that has prompted me after each reboot, i have used the pin without any issues, however once i transferred the data from not 9 to S20 I was getting invalid PIN, and i know the PIN as I used it constantly. The phone was managed by Google Workspace Admin.
After consulting with Google support we removed the PIN on the google, however Unfortunately i won't get pass the boot process.
My question would be is there any way I can bypass this requirement by flashing the bootloader or anything that might be available at all, i have some valuable files and some family photos which are more valuable to me that weren't transferred over. At this point I'm ready to try anything even if it means the phone be bricked as it seems so far I only have the option to wipe it out.
The developer options are enabled on the phone, as far as i remember.
Anyone?
Thank you for reading and I will be more than happy to provide any more info for anyone willing to point me to the right direction, I'm not looking to be spoonfed, just pointed out to what i can do if anything can be done. I do own the phone its my phone, and this is NOT for any malicious purposes, jut to get access to the phone I own it and to my personal files.
tnycman said:
(...) i won't get pass the boot process.
(...)
Click to expand...
Click to collapse
Could you show it in a photo?
Here you go..
I was able to rescue my own behind, it reverted back to an old pin!! I had only one try left.. phew.. yay. Thanks everyone!!

Categories

Resources