Issues with spoofing MAC address on Samsung Galaxy S6 G920W8 - Android Q&A, Help & Troubleshooting

Hey guys, I'm currently using a rooted Samsung Galaxy S6 G920W8 with Wind Mobile. I have an issue, and it's with spoofing the MAC address of the device. My parents have blacklisted my MAC address so I am no longer able to access the wifi. The router that I'm trying to connect to is a Bell Home Hub 2000.
Let's say I used an app (any apps) from the Google store (along with Pry-Fi, which destroyed my wifi and I had to reinstall the stock OS to make it work again), it temporarily changes the MAC address until I restart the wifi, but here's the catch: there's an authentication error when attempting to connect to my wifi. Terminal commands produce the same auth error. I don't experience the authentication issue when spoofing the mac address on Windows 7 and 8.1.
Keep in mind I'm a wannabe when it comes to android-related things. I don't know what I'm doing 99.99% of the time.
I've tried tampering around with /efs/wifi/.mac.info and changing the MAC from there, nothing happened.
I've also tried tampering around with /.init.wifi.rc, setting .mac.info to read-only and executing the file. Still no luck.
I remember once I was tampering around with the two files mentioned above and I somehow managed to make it work, but I don't remember how.
I've tried using Locally Administered MAC addresses and Globally Unique MAC addresses, but that still didn't do the trick.
I'm hoping someone here might be able to help me out in any way by providing clear steps as to what I should do.
If someone could provide a custom kernel that would fix the issue, that would be fantastic.
Thanks for reading.

Spoofing a mac address is not completely easy without things getting messed up completely.
If your parents blocked it then to be honest take the hint.
Also they may not blocked it persay but set only allowed macs to connect. This is what I did to my kids devices. Now unless I add the device. Nothing connects.

zelendel said:
Spoofing a mac address is not completely easy without things getting messed up completely.
If your parents blocked it then to be honest take the hint.
Also they may not blocked it persay but set only allowed macs to connect. This is what I did to my kids devices. Now unless I add the device. Nothing connects.
Click to expand...
Click to collapse
I don't mean to sound rude, but I asked for a solution, not for advice from a parent's perspective. Now if you read carefully, you would've seen that I'm able spoof my mac on a Windows OS and successfully connect to the internet. Take the hint, it means MAC filtering is disabled.
I appreciate you taking the time to write a reply, though it isn't exactly the one I'm looking for.

BouncingHitman said:
I don't mean to sound rude, but I asked for a solution, not for advice from a parent's perspective. Now if you read carefully, you would've seen that I'm able spoof my mac on a Windows OS and successfully connect to the internet. Take the hint, it means MAC filtering is disabled.
I appreciate you taking the time to write a reply, though it isn't exactly the one I'm looking for.
Click to expand...
Click to collapse
Saying it works on windows is completely pointless. They are 2 very different operating systems. Just because something can be done on one doesn't mean it can be done by another. Now as changing the Mac is in the Grey of being illegal you will be hard pressed to find any help here. Let alone the Mac is hard coded and once you mess it up there is almost no recovering and most of the time you can never connect to wifi ever again as it get stuck on an invalid Mac.
Now this isn't even from a parents view. It's from just another person. You should respect their wishes. Want to do what ever you want then get your own Internet connection.

zelendel said:
Saying it works on windows is completely pointless. They are 2 very different operating systems. Just because something can be done on one doesn't mean it can be done by another. Now as changing the Mac is in the Grey of being illegal you will be hard pressed to find any help here. Let alone the Mac is hard coded and once you mess it up there is almost no recovering and most of the time you can never connect to wifi ever again as it get stuck on an invalid Mac.
Now this isn't even from a parents view. It's from just another person. You should respect their wishes. Want to do what ever you want then get your own Internet connection.
Click to expand...
Click to collapse
It must be a coincidence that I might not find any help here, as there's a lot of unanswered threads in this sub-forum. Everything I've learnt regarding mac spoofing for android was found within the xda forums, so please. Yes, you are right. The MAC got stuck on an invalid MAC and I had to reinstall the stock firmware.
Again, I need solutions. I don't care about information that won't help me advance forward with what I'm trying to accomplish. I know it's possible, because like I've mentioned in the original post I've succeeded doing it by accident.
Please stop further wasting my time in writing useless replies and do like the other 15+ thread viewers: don't write anything if it isn't contributing towards my success with spoofing the MAC. :good:

BouncingHitman said:
It must be a coincidence that I might not find any help here, as there's a lot of unanswered threads in this sub-forum. Everything I've learnt regarding mac spoofing for android was found within the xda forums, so please. Yes, you are right. The MAC got stuck on an invalid MAC and I had to reinstall the stock firmware.
Again, I need solutions. I don't care about information that won't help me advance forward with what I'm trying to accomplish. I know it's possible, because like I've mentioned in the original post I've succeeded doing it by accident.
Please stop further wasting my time in writing useless replies and do like the other 15+ thread viewers: don't write anything if it isn't contributing towards my success with spoofing the MAC. :good:
Click to expand...
Click to collapse
First off don't bother telling me what not to post.
Second off as it is borderline illegal to do so you are lucky I didn't just delete the thread when I saw it.
Also keep in mind this is not a support Forum. It's a developers forum.

zelendel said:
First off don't bother telling me what not to post.
Second off as it is borderline illegal to do so you are lucky I didn't just delete the thread when I saw it.
Also keep in mind this is not a support Forum. It's a developers forum.
Click to expand...
Click to collapse
MAC spoofing isn't illegal unless you're intending to do malicious things with it. Besides, this thread is posted in the subforum called "Android Development and Hacking Android Q&A, Help & Troubleshooting". In case that didn't ring a bell, it's here where people ask for support. I figured seeing this is a android developers forums, there would be a plethora of smart people that could help me with a platform that I'm not familiar with.
Here's the deal, I'm paying part of the rent and the internet, but seeing there's a conflict between the relationship with my mom's boyfriend and I he decided to be a **** and block me off. Now, is MAC spoofing to get access for something that I paid for in any way illegal? No, it is not. Are you happy that I had to enlighten you on what's going on in my life in order for you to understand the situation? Are you going to ask me to respect my mom's boyfriend's wishes?
Please, respect my wishes and leave the thread which I started alone. You're causing unwanted commotion and spam just because I asked for a simple request. The best thing you can do is just bite your tongue and not reply to my thread. You should private message me if you have a problem, not tell me "you're lucky I didn't delete your thread" in order to gain leverage over the argument. If it was illegal you would've deleted it at first sight. I expect more coming from a reputable Senior Moderator that's been around for almost 10 years.

BouncingHitman said:
MAC spoofing isn't illegal unless you're intending to do malicious things with it. Besides, this thread is posted in the subforum called "Android Development and Hacking Android Q&A, Help & Troubleshooting". In case that didn't ring a bell, it's here where people ask for support. I figured seeing this is a android developers forums, there would be a plethora of smart people that could help me with a platform that I'm not familiar with.
Here's the deal, I'm paying part of the rent and the internet, but seeing there's a conflict between the relationship with my mom's boyfriend and I he decided to be a **** and block me off. Now, is MAC spoofing to get access for something that I paid for in any way illegal? No, it is not. Are you happy that I had to enlighten you on what's going on in my life in order for you to understand the situation? Are you going to ask me to respect my mom's boyfriend's wishes?
Please, respect my wishes and leave the thread which I started alone. You're causing unwanted commotion and spam just because I asked for a simple request. The best thing you can do is just bite your tongue and not reply to my thread. You should private message me if you have a problem, not tell me "you're lucky I didn't delete your thread" in order to gain leverage over the argument. If it was illegal you would've deleted it at first sight. I expect more coming from a reputable Senior Moderator that's been around for almost 10 years.
Click to expand...
Click to collapse
Still not a support Forum.
Now you might want to check your attitude at the door.
So let's look at this for a min. If the Internet account is not in your name then it is illegal by the letter of the law. Doesn't matter who pays for what.
The only reason I didn't delete it is so it comes up when others search this topic.
You want to get this fixed then you have 2 choices. 1. Fix the issue you have at home with your connection. 2. Figure out how you got it to work before.
Now I will end this here and close this thread. Good luck to you and what ever you figure out.

Related

Bluesnarfing

Does anyone know how to do it on the Droid?
Is there a single honorable reason why you would be interested in doing this?
I sure can't think of one.
well as soon as wifi packet injection works on android i am switching.
¿GotJazz? said:
Is there a single honorable reason why you would be interested in doing this?
I sure can't think of one.
Click to expand...
Click to collapse
Vulnerability testing... an auditor who wants to do bluetooth related pen test with his/her phone?
archangelugp said:
Vulnerability testing... an auditor who wants to do bluetooth related pen test with his/her phone?
Click to expand...
Click to collapse
Lets go with that . So I'm guessing theres no way yet?
alienware777 said:
Lets go with that . So I'm guessing theres no way yet?
Click to expand...
Click to collapse
Nope. Not yet.
I don't see why it matters to anyone why someone wants this.
I want this too. I don't have to explain to anyone as to why I want it. Because, it is absolutely none of your business. If you don't know how to implement it, then don't post.
Lol. This is a public forum. Of course you don't have to explain why you want something. Equally, if someone who could help doesn't want to, because they suspect you're up to no good, they don't have to justify their actions either, let alone help you. Blessed be.
cauli said:
Lol. This is a public forum. Of course you don't have to explain why you want something. Equally, if someone who could help doesn't want to, because they suspect you're up to no good, they don't have to justify their actions either, let alone help you. Blessed be.
Click to expand...
Click to collapse
Touché. I'll admit it. The main reason I want this is to mess with my friends. Nothing actually detrimental. Same reason I like sms bombers, and caller id fakers.
But still, this would be great to add on to my list
This would be so awesome..just from a security standpoint to be able to show and explain to friends and family to not there guards down when it comes to cyber theft and to turn off your radios when not in use
I never quite understand answers like this. This forum is for the exchange of information, not personal opinions. People that think their some kind of 'ethics police' need not be on this type of site. This site is for the exploration, hacking and development of our phones. Rooting & custom firmware is frowned upon by security researchers and manufacturers alike, but because your into it, it's morally correct?
supern0va said:
I never quite understand answers like this. This forum is for the exchange of information, not personal opinions. People that think their some kind of 'ethics police' need not be on this type of site. This site is for the exploration, hacking and development of our phones. Rooting & custom firmware is frowned upon by security researchers and manufacturers alike, but because your into it, it's morally correct?
Click to expand...
Click to collapse
Yep, one man's "not needed" is another man's necessity. This is no less needed than say someone thinking they need a ps3 controller (or wiimote) working with their phone, but no one really complains about that.
here's a very legitimate reason for you so if you know how PM me
Hi,
A friend of mine has an older mobile with a broken touchscreen - the phone no longer has a SIM or a RAM card and is in "Music Sync" mode when it connects to a PC via USB.
They are currently in a court case and need to get their old SMS's off the broken phone - all the "forensic" mobile software out there (from $500 up to $5000!!!) require that the phone is in PC-Suite (or PC-Sync) mode. This can't be changed on the phone as the touchscreen doesn't work.
The only way to get to the SMS's is by Bluesnarfing, so if you know of a PC program or a WinMo 6.5 program that will let me access their phone PM me.
Thanks.
Why is there always that one person that offers no assistance, takes up bandwidth questioning your motives...
For those that don't know:
"Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to Bluejacking, although both exploit others’ Bluetooth connections without their knowledge. Any device with its Bluetooth connection turned on and set to “discoverable” (able to be found by other Bluetooth devices in range) can be attacked. By turning off this feature you can be protected from the possibility of being Bluesnarfed. Since it is an invasion of privacy, Bluesnarfing is illegal in many countries."
Thread closed

Tethering after VZW pulls t#e plug?

I am coming from a DX where TBH modded the NV files to use the stock hotspot application.
I was wondering if there has been any devs taking a look into this...
And by the way I DO NOT want to start a ethics war on tethering or not tethering...
Thank you
There's been threads with lots of useful information (and posts) within the last couple of weeks. You'll probably get more informative answers looking at those then asking people to repeat what they already said.
yareally said:
There's been threads with lots of useful information (and posts) within the last couple of weeks. You'll probably get more informative answers looking at those then asking people to repeat what they already said.
Click to expand...
Click to collapse
I have skimmed thru quite a few recent posts regarding tethering and I find none of them useful in answering my question. I see that many of the posts go on to get a smartass remark or two from someone who has not a clue about how to answer the question.
Kinda like what happened in this post.
So I would like a linky or a better answer.
Ohhhh, if you want a smartass answer, I could do far better....
That was only my polite, "look around the knowledge base because it's useful" answer that noobs seem to find insulting anyways.
If I really wanted to be insulting, I would tell you to RTFM . I help plenty of people with legitimate questions, feel free to look at my post history and see for yourself.
But really, I do agree the ways people say it tend to be rather blunt.
However, the overreactions to even sensible replies to search around are also just also just as bad, since there doesn't need to be a new posting always and some people just don't think before they make one and reminding them to do a little search I think helps (if done in a not so overly rude way). My initial post was not a slight against you but a word of advice that people will do what you just said, insult you and give you non-helpful replies.
IDK what kind of solution you are looking for, but there isn't a magical "Verizon will give you free unlimited tethering legitimately without extra cost option if you ask them really nicely" or a "I'll come right over to your house code and compile the most amazing tether app in the world that actually boosts your LTE speed beyond what Verizon gives you and does your homework when it's idle."
Instead of taking the defensive because someone asked if you looked around a little, perhaps clarifying your question in a way that shows that you actually searched (i.e. "I noticed there was this method to tether or that, but I don't really like those options") makes it clear to everyone you gave it an honest shot and also motivates people to want to help you more
It also keeps things on topic so you get the answer you want faster. Just for future reference.
I searched the TB forums and didn't really see anything on the subject. I only found
http://forum.xda-developers.com/showthread.php?t=1082585
Maybe there's more in the general Android forums, though I didn't find much there either. I could just suck at searching.
http://forum.xda-developers.com/showthread.php?t=1087475&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1074992&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1077029&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1070477&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1064246&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1060549&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1056647&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1054866&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1060701&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1034262&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1007537&highlight=tether
http://forum.xda-developers.com/showthread.php?t=1030818&highlight=tether
and many more (I stopped on page 6 http://forum.xda-developers.com/search.php?searchid=74208283&pp=25&page=6)
I recommend using advanced search and "search by post" not by title. You'll get more relevant info that way. If you happen to be an opera mobile or desktop user, you can make a custom search from http://forum.xda-developers.com/search.php?f=940, by hold pressing on the search bar for that page for mobile or right clicking for the desktop. It will then add it to your other custom searches for easy access
Anyone of the links above mention this?
http://www.androidpolice.com/2011/0...ave-your-data-session-cut-off-with-an-upsale/
ddgarcia05 said:
Anyone of the links above mention this?
http://www.androidpolice.com/2011/0...ave-your-data-session-cut-off-with-an-upsale/
Click to expand...
Click to collapse
No, because it's a different phone that was never fully rooted and it's the only phone mentioned, but it's worth talking about since it's the first threat that comes off as more than words (though it could still be regardless). Verizon can tell what you're doing far easier on it than other phones because you don't ever have full control of it on the droidx. If there's any phone that can detect if you're doing unauthorized tethering, it's going to be a phone that's locked down. People who buy moto get what they pay for.
Though someone did mention it somewhere in some topic on the thunderbolt forums about the droidx having ways to detect it, but it was just glossed over.
I never used stock hotspot app because I never even try apps with monthly charges. what's the point of checking it out and potentially getting hooked when I'm absolutely certain that I will NOT pay monthly charge for that. I'd rather switch back to T-mobile
with that said, I'm using wifi tether as I write this. it took me a while to configure it because it wouldn't work out of box but it's free and well worth the price!
I've been busy lately and havent kept up with this...so Verizon shut down the free tethering apps, like "wifi tether for root" and others?
Not to throw this thread off topic or anything I just wanted to know how you got the H and # key's confused in the thread title as they are quite far apart. Again, sorry to everyone just kind of a weird mistake.
yareally said:
No, because it's a different phone that was never fully rooted and it's the only phone mentioned, but it's worth talking about since it's the first threat that comes off as more than words (though it could still be regardless). Verizon can tell what you're doing far easier on it than other phones because you don't ever have full control of it on the droidx. If there's any phone that can detect if you're doing unauthorized tethering, it's going to be a phone that's locked down. People who buy moto get what they pay for.
Though someone did mention it somewhere in some topic on the thunderbolt forums about the droidx having ways to detect it, but it was just glossed over.
Click to expand...
Click to collapse
Seems the Thunderbolt running gingerbread is the same way, although I reverted back to froyo for the time being so I cannot confirm what this article states.
http://www.droid-life.com/2011/05/3...ireless-tether-asks-that-you-purchase-a-plan/
Doesn't CM7 provide an integrated tethering solution? That should be undetectable to Verizon.
If they are baking something into the gingerbread update to detect tethering apps (pun not intended but welcome), it won't find its way into the CM7 code.
dirtyfingers said:
Seems the Thunderbolt running gingerbread is the same way, although I reverted back to froyo for the time being so I cannot confirm what this article states.
Click to expand...
Click to collapse
I doubt anyone on a T-bolt can confirm since we're still getting free hotspot. Unless they are allowing official hotspot use but blocking tethering apps.
I suppose that would make sense if they're trying to get people hooked on the feature.
Yareally thanks for the links. I don't know if you own a xoom but I have yet been able to get the search feature to work in the xda site. Maybe you could find a link for that as well and post it for me.
I am not currently at home with access to my laptop where I have full availability to use the advanced search feature. So thanks again for making these links available in ones easy to find location.
As for the #.. I use thumb keyboard on t#e xoom and it is t#e result of a long press on t#e h key. I think you should be proud if yourself for being able to figure out what I meant to type.
No offence to anyone but some times when you all jump on people asses there may be extenuating circumstances.
Sry for your troubles. But I hope you rest good at night knowing that you have helped one soul find some good info.
The search feature using a web browser or using the application for xda? I've heard the application has lots of issues for anyone period with the search and since many seem to use it, it's probably the reason for lots of duplicate posts. If you mean browsing it on an internet browser, that seems new to me as far as I know.
I've never used it, I just browse using opera mobile (with a link to the thunderbolt forum on my speed dial and the search tied into the search bar next to the url bar).
Opera mobile still has an unresolved issue with LTE being throttled (max of like 150KB/s), but it's not a deal breaker for me at least compared to using the stock browser in terms of getting to where I want to go quickly and its tie-ins to the desktop browser.
No worries about the thread. Internet makes it hard at times to interpret someone's replies anyways since words can be taken many ways, lol.

Bootloader Unlocking Effort

Hey all,
I've been a lurker for a while, been looking for a way to encourage the now Google-owned Motorola Mobility to unlock their bootloaders much like HTC has wisely done, but it's becoming more and more obvious to me that they don't care about the "minority" of us that actually feels as though we are entitled to full admin rights on our phones that we either paid a ton of cash for, or signed a lengthy contract to obtain. Verizon is the one blocking it? HTC found a way, and so can Motorola Mobility...that is cop-out.
My proposal is that there be an effort to unlocked the bootloader, I am not some expert programmer, and I am open to whatever will help the cause. I know there was a bounty on it, but to me this isn't about money, I'll donate time, money, information ripped from my phone if it, in some way, contributes to unlocked that bootloader. Even if you need my unused CPU cycles to calculate things, I don't care, just tell me what I can to do help, because I am sick of not being able to use my phone to it's fully potential.
Maybe I am being naive, but I believe if we all worked together we could accomplish this goal. If you agree, please, let's organize and figure this out!
-Joshua
I love optimism
I'm down with the movement...
This phone does have mad potential to be so limited compared to other phones.
I just can't believe that we are running an unofficial, incomplete version of CM7 and it runs smoother than stock Blur.
Is that telling you something about Motorola?
Do you guys think Google will make that decision for Motorola or will Moto stay the same?
Sent from my Android
Worth a try...
Re: Google changing Moto policy
I don't know so much about Google changing Motorola's stance on the locked bootloader, we've tried petitioning the company themselves, but have we tried petitioning Google? Or maybe it's too soon, maybe they are working on it right now? Hard to tell, and I don't want to put pressure on Google too soon especially if they are trying diligently right now to do the right thing.
But the above poster is right, cracking it ourselves is definitely worth a try. I have contacts (unfortunately know inside Motorola), I know people with lots of knowledge on encryption, I'll be honest one of my friends does have a knack for the impossible, but this would be too much for one lone person. I also have a few computers in the house, to donate computing power. None above 5 GB of RAM unfortunately, but my friend with all of that know-how does also have a synchronous 20/mbit up/down connection to the net, if that helps, and I have another friend that is the linux admin at a an unnamed private university in Durham that might could lend a hand in some way.
We have the resources, we just need to pool them.
Someone with the realistic technical know-how, just tell us where to begin, and the shortest path to getting to our goal and we'll do all we can to contribute!
Thanks for understanding and not just writing this off as a pipe-dream...because I know if we work together we can accomplish almost anything.
-Joshua
spyda256 said:
I don't know so much about Google changing Motorola's stance on the locked bootloader, we've tried petitioning the company themselves, but have we tried petitioning Google? Or maybe it's too soon, maybe they are working on it right now? Hard to tell, and I don't want to put pressure on Google too soon especially if they are trying diligently right now to do the right thing.
But the above poster is right, cracking it ourselves is definitely worth a try. I have contacts (unfortunately know inside Motorola), I know people with lots of knowledge on encryption, I'll be honest one of my friends does have a knack for the impossible, but this would be too much for one lone person. I also have a few computers in the house, to donate computing power. None above 5 GB of RAM unfortunately, but my friend with all of that know-how does also have a synchronous 20/mbit up/down connection to the net, if that helps, and I have another friend that is the linux admin at a an unnamed private university in Durham that might could lend a hand in some way.
We have the resources, we just need to pool them.
Someone with the realistic technical know-how, just tell us where to begin, and the shortest path to getting to our goal and we'll do all we can to contribute!
Thanks for understanding and not just writing this off as a pipe-dream...because I know if we work together we can accomplish almost anything.
-Joshua
Click to expand...
Click to collapse
i love your optimism i have some old pms that may help with the effort
SHA-1 brute force can be cracked for around $2 of Amazon cloud computing service.
http://www.geek.com/articles/news/r...for-2-10-with-amazons-cloud-service-20101122/
Isn't boot loader use SHA-1 encryption?
(of course, the key may be much longer, but it may not be impossible for cheap. I say try to pool together like $100 and try Amazon cloud computing a try?)
Re: Amazon
hpark21:
I like the way you're thinking, does anyone else think this might be a good call? I know there was a bounty of around ~$800 somewhere, so I doubt if all of us who rightfully were promised and unlocked bootloader wouldn't mind pooling a bit of money for the computing power, hell I myself would give $50 to the effort if we knew it was a viable solution.
Other thoughts?
Also, ztotherad, if you could send me those PMs maybe we can sift through those and see if there are some other avenues, nothing is off the table at this point.
thanks again for coming together on this, that is the true meaning of community.
spyda256 said:
hpark21:
I like the way you're thinking, does anyone else think this might be a good call? I know there was a bounty of around ~$800 somewhere, so I doubt if all of us who rightfully were promised and unlocked bootloader wouldn't mind pooling a bit of money for the computing power, hell I myself would give $50 to the effort if we knew it was a viable solution.
Other thoughts?
Also, ztotherad, if you could send me those PMs maybe we can sift through those and see if there are some other avenues, nothing is off the table at this point.
thanks again for coming together on this, that is the true meaning of community.
Click to expand...
Click to collapse
i can def send you them, idk how much help theyll be
Uh, I think it's already been established that brute forcing it is impossible.
Stuckinabox said:
Uh, I think it's already been established that brute forcing it is impossible.
Click to expand...
Click to collapse
In one of the many threads concerning bootloader unlocks, I believe the chances of us finding it were determined to be 1mill:1. It would take us over a decade to manually come up with the key. I don't want to kill confidence, but I'd like to keep things relatively rational.
Sent from my MB870 using xda premium
Stuckinabox said:
Uh, I think it's already been established that brute forcing it is impossible.
Click to expand...
Click to collapse
it's been established that brute forcing is nearly impossible, not completely impossible
it is something that would take an insane amount of resources to accomplish , and/or time ,
it would really come down to "how lucky are we?" really, as in::: how lucky are we that we stumble across or know a genius that can crack it, stumble across needed files, etc...
good luck to all who try, I wish I could do anything to get us there, but I don't know the first thing when it comes to this stuff, don't give up the dream!
Basically, what it comes down to is:
Find out what their hash key is. (encrypted password)
Then, try to go through all valid characters and see whether the input matches the output hash.
If one is lucky and they used short enough password, then it will be quick to find.
If unlucky and they used really long password, then the answer is that we won't be able to find it in REASONABLE time. (I would say 1-2 months to be reasonable - at $2/hr, it would cost $48/ day).
Only issue is when do we stop?
hpark21 said:
Basically, what it comes down to is:
Find out what their hash key is. (encrypted password)
Then, try to go through all valid characters and see whether the input matches the output hash.
If one is lucky and they used short enough password, then it will be quick to find.
If unlucky and they used really long password, then the answer is that we won't be able to find it in REASONABLE time. (I would say 1-2 months to be reasonable - at $2/hr, it would cost $48/ day).
Only issue is when do we stop?
Click to expand...
Click to collapse
There was some kind of crazy algorithm applied to each character to generate the correct item for each number of the key, correct? We would have to come up with that too?
Sent from my MB870 using xda premium
THANK YOU! Finally ... a revived movement. I pledged $100 on another thread and I'm good for putting it toward an unlocked bootloader again!
To learn from one of the most influential groups of our generation ... anonymous utilizes botnets to pool computing resources ... if we get a tool that could function similarly, could we not pool 1000s of computers together to crack it faster? It would make what is not feasible for a small set of computers to do... feasible. If all most users have to do is download a tool that gives us access to processing power and bandwidth ... users will download the hell out of it.
Count me in.
[ sent from _base2 ]
Hope
I understand doubters, and odds are likely against us, but that's ok, no one person can do it, and maybe not just one method, but somehow we WILL get to our goal. Whether Motorola capitulates or we find a method to crack it, we will not have this awesome hardware go to waste.
I am not generally a "black hat" kind of person, but in this case we are in the right so far as I am concerned (please don't quote DMCA BS to me, lol) because they made a promise to their customers, and it will be kept, whether they like it or not.
So, I am with the above poster that mention he didn't know quite where to start, or where we have already made progress, but if someone can help us out, explain the process, we figure out how to move forward. (Please forgive the run-on sentence).
I've minimal experience programming, only VB.net, C++, and a bit of Java from college, and I do tier 2 desktop support for a bank these days, but on my off time I'd love to spend it on something worthwhile, all of you deserve this, and we'll make it happen.
Maybe it's the troubleshooter in me that sees the problem and says "oh no, there's a way, we just need to find it". I have a colleague, the one I spoke of before, he has a knack for doing incredible things, so once we have a breakdown of what we need to do, perhaps he can be of help.
So my friends, where do we go from here?
spyda256 said:
I understand doubters, and odds are likely against us, but that's ok, no one person can do it, and maybe not just one method, but somehow we WILL get to our goal. Whether Motorola capitulates or we find a method to crack it, we will not have this awesome hardware go to waste.
I am not generally a "black hat" kind of person, but in this case we are in the right so far as I am concerned (please don't quote DMCA BS to me, lol) because they made a promise to their customers, and it will be kept, whether they like it or not.
So, I am with the above poster that mention he didn't know quite where to start, or where we have already made progress, but if someone can help us out, explain the process, we figure out how to move forward. (Please forgive the run-on sentence).
I've minimal experience programming, only VB.net, C++, and a bit of Java from college, and I do tier 2 desktop support for a bank these days, but on my off time I'd love to spend it on something worthwhile, all of you deserve this, and we'll make it happen.
Maybe it's the troubleshooter in me that sees the problem and says "oh no, there's a way, we just need to find it". I have a colleague, the one I spoke of before, he has a knack for doing incredible things, so once we have a breakdown of what we need to do, perhaps he can be of help.
So my friends, where do we go from here?
Click to expand...
Click to collapse
sir, did you get my pms?
Re: PMs
Nope, just saw them, thanks for that!

Serious ways to bypass a screen lock without data loss

Hello all,
In my circle of friends there was a suicide case and I was asked by the family if I would be able to remove a screen lock from a Samsung Galaxy S21. The family can't explain why their son killed himself and would like answers to all their questions. They assume that there is information on the phone or reasons for the suicide.
Are there any serious ways to get around such a block? I don't have much information about the device yet, nor do I currently have it with me. Maybe there are exploits or bruteforce toolkits to bypass the lockscreen. Programs like Tenorshare 4uKey or PassFab Android Unlocker are probably scam or?
I will get the device in the next week and could provide more information then.
Currently the following information is available:
Device Model: Samsung Galaxy S21 5G | Samsung SM-G991B | Android 11 | One UI 3.1
Mobile contract: active
SMS PIN & PUK: available
Google account credentials: available and valid and linked to the device but no backups available in Google Drive
Samsung account credentials: present and valid but not associated with the device so no backups available
Does the approach via Kali Nethunter and a HID keyboard attack work with a current Android Samsung Galaxy S21 bruteforcing or do you always get into the temporally increasing lock?
A data recovery $pecialist might be able to, ask the police for assistance.
Find the password for the lockscreen, or maybe through their Gmail or Samsung accounts, again passwords needed.
I think if they wanted you in the phone they would have unlocked it...
blackhawk said:
A data recovery $pecialist might be able to, ask the police for assistance.
Find the password for the lockscreen, or maybe through their Gmail or Samsung accounts, again passwords needed.
I think if they wanted you in the phone they would have unlocked it...
Click to expand...
Click to collapse
This is not a helpful answer.
The police in this country does not help in such matters if it is assumed that no outside influence was involved.
A data recovery specialist also only executes toolkits or exploits. I am also able to do this if someone gives me a hint which toolkits or exploits would come into question for this model. I work as a sysadmin myself and therefore I am not completely untalented technically. I just lack information about which approach would be the best.
This is a community of people who like to hack their phones, not hack into other people's phones... which is considered unethical.
Are you serious?
You really think it's unethical when a 21 year old boy takes his own life overnight and the family just wants to know why their son did it? Sure, the boy was of age at 21 and can do with his life what he wants. Nevertheless, any clear-thinking person can understand that the family wants to know why the son did that.
I have no bad intentions and I am only trying to help the family. This is not about hacking a stolen cell phone. Then I would just do a factory reset and use the phone normally and not write this post here.
Yes, well... be that as it may.
With a screen lock in place you can't simply factory reset as you still be locked out.
I believe my original response was valid. It's not an easy nut to crack... by design.
Hello, i own a phone repair shop and i'm a relation with a person specialized in unlocking phones. He said me that he can bypass the lock screen and keep data on all samsung phones and he can do it remotly. Being in this business i don't trust him a lot about keeping data. One of my customer's son is dead and his family want to access his phone, they gave me his phone and they are agree to loose data if things dont go good so i'm gonna try with this guy and if you want i will give you a feedback.
Hi sorry to hear that this terrible situation happened around you.
I am in a similar situation. My cousin died suddenly and his sister asked be to recover pictures and videos because he filmed himself before try to end his life and she would like to find if there is any video that could help us understand better.
I'm trying to find ways to do that and so far I haven't but I wanted to share some information in case it could be helpful to someone.
I tried the iMobie Data Extractor. It is supposed to help recover data from "broken phone". I guess it's the closest thing I found that didn't look scammy and could work. After about a month of back and forth with their support person, I managed to replaced the OS using Odin (because the official software left my phone in a non-bootable state) replacing all partitions except User Data. Unfortunately, that didn't remove the lock (PIN). I'm not surprised since I didn't wipe the User Data.
From a security perspective, it is good that it is hard (impossible) to access data of a locked phone, but from a family emotional perspective, it is hard to have to tell my family that I failed.
I wish you good luck and please post here if you find a way.
be safe
Touftaf said:
Hello, i own a phone repair shop and i'm a relation with a person specialized in unlocking phones. He said me that he can bypass the lock screen and keep data on all samsung phones and he can do it remotly. Being in this business i don't trust him a lot about keeping data. One of my customer's son is dead and his family want to access his phone, they gave me his phone and they are agree to loose data if things dont go good so i'm gonna try with this guy and if you want i will give you a feedback.
Click to expand...
Click to collapse
What happened
I don't have easy-to-hear information for you. But I offer these words as a way to think about this situation.
I believe Samsung intentionally builds phones which are extremely hard to break into. This is a conscious design decision they make. Why? Because so many users do things like credit card payments, banking, and social media, where, if you lost your phone and a bad person found it, an easy-to-break-into device would have potentially catastrophic results. Aside from the harm to a user who lost a phone, Samsung themselves would be subjected to great reputational damage, too. It's bad press when it's easy to break into and steal something.
Also, you may not be able to break into the device, even with the help of a commercial vendor. Exploits in Android, when found, are patched regularly. A very smart person might have had a way to crack into a phone last week, last month, or last year. But again, Samsung intends to continually patch the software to keep it secure. They make a point to telling people that Samsung phones are patched for several years, so users will feel confident their data will be secure.
One suspects certain governments have police or security organizations who likely could break in, but they are unlikely to help in a personal situation, as you described.
Although this doesn't seem to apply to you, it's worth saying that Samsung phones are also backed up (by default) to their "cloud." It's possible that a lawyer might be able, with proper documentation of the owner's death, to get access to Samsung's (or Google's) cloud backup(s). I don't think it's easy though. Google, at least in the USA, allows the owner of an account to specify how Google should handle their data if they stop accessing their accounts. (I think Google treats an idle account as "dead" and for reasons like this, if you no longer want to use a vendor like Samsung or Google, you should proactively delete your account, not merely let it go idle.)
Anyone reading this post, might want to consider having what can be an uncomfortable conversation with your friends and family: "How would you like your friends and family handle your electronic, financial, and social accounts in the event of your death?"
Please, forgive me if any of this sounds insensitive. My father worked in insurance and as part of his job he knew all to well that all people eventually die. And how hard it is for those left behind to pick up the pieces, especially when secrets are involved. My family knows where to find my keys.

Question I have been totally hacked for 9 months

We have been through five phones -Samsung Galaxy, then Motorola, two internet providers two cell phone providers, made so many calls I have lost count. He uses Chromebook and a Motorola Droid phone. He has even hacked my old home phone, tv, you name it, he has tried to own it . Oh, I forgot-my home security and ring doorbells also. I can change an app permission and I can see him go right in and change it back. I am sure he lives close in the neighborhood How do I get rid of this horrible person?
He grays out permissions, default apps, etc., Which keeps me from being able to delete an app, or change someone being able to access in the background. He has confiscated our emails (Gmail), prevents us from sending or receiving ones he doesn't like. He uses email for email on the web, advertising, chat, and many other things. He listens to phone calls steals all photos, maps addresses to companies or people in contacts, uses maps for ?? Xxx an anyone help me, or at least tell me how to reverse graying out on apps? This has become unbearable! Thank you!
How do you know it's a he?
It's always the girl next door.
Lol! I cannot prove it, but the big gamers nextdoor moved in when this started happening. Their best friend is an experienced IT guy who only appears when I have gone in and changed things. In those days, new changes happen, such as Ring doorbells hacker, etc. Not blaming, but coincidence?
blackhawk said:
How do you know it's a he?
It's always the girl next door.
Click to expand...
Click to collapse
Sorry. See reply in post.
Bro, I'm so sorry. My husband has been going through this VERY thing for the past year. They don't mess with mine. I just wanted to let you know even though I don't have any resolve for you, I hear you and know that it's not phony and we totally feel for you. Seriously, maybe you and my hubby can talk. I'm so sorry that you're going through it. Feel free to message me.
This sounds like a great fan fiction and will bookmark this to see how the story develops. Thank you for putting this in Moto G Power section right where it belongs!
Sounds like you might need to invest in a router with better security features.
Moosetears said:
This sounds like a great fan fiction and will bookmark this to see how the story develops. Thank you for putting this in Moto G Power section right where it belongs!
Sounds like you might need to invest in a router with better security features.
Click to expand...
Click to collapse
Definitely not fiction. It is a nightmare and could REALLY use some advice!
gunnshot81488 said:
Bro, I'm so sorry. My husband has been going through this VERY thing for the past year. They don't mess with mine. I just wanted to let you know even though I don't have any resolve for you, I hear you and know that it's not phony and we totally feel for you. Seriously, maybe you and my hubby can talk. I'm so sorry that you're going through it. Feel free to message me.
Click to expand...
Click to collapse
It has been a nightmare! They started with mine, and have now invaded my husband's phone also.
Scammed said:
It has been a nightmare! They started with mine, and have now invaded my husband's phone also.
Click to expand...
Click to collapse
Why are you posting on XDA? If you are this convinced that someone has unauthorized access to your devices, you need to be talking to law enforcement. The best advice we can offer you is to change all your passwords immediately, enable 2 factor authentication, and if possible seek a restraining order. XDA is a smart device hacking and development community, not a private investigation service.
V0latyle said:
Why are you posting on XDA? If you are this convinced that someone has unauthorized access to your devices, you need to be talking to law enforcement. The best advice we can offer you is to change all your passwords immediately, enable 2 factor authentication, and if possible seek a restraining order. XDA is a smart device hacking and development community, not a private investigation service.
Click to expand...
Click to collapse
I didn't think you were a p.i. firm. Obviously, I am not tech savvy. A little kindness please? I simply want to know how to ungray grayed out app permissions. I have searched on my own and cannot find the answer. I have reported it to local police, state police, Motorola, Samsung, Verizon, Xfinity, metronet, on and on and on. No help from anyone. I don't have $2,500.00 to just put down a retainer for a p.i. I knew someone on this forum would know the answer I am searching for and might kindly tell me. Thank you.
Scammed said:
I didn't think you were a p.i. firm. Obviously, I am not tech savvy. A little kindness please? I simply want to know how to ungray grayed out app permissions. I have searched on my own and cannot find the answer. I have reported it to local police, state police, Motorola, Samsung, Verizon, Xfinity, metronet, on and on and on. No help from anyone. I don't have $2,500.00 to just put down a retainer for a p.i. I knew someone on this forum would know the answer I am searching for and might kindly tell me. Thank you.
Click to expand...
Click to collapse
Well, it can be hard to distinguish the difference between reasonable concern over privacy violations vs unwarranted paranoia, and you aren't the only one who's come to XDA with this type of story. Most of your assumptions are likely mistaken and can be simply explained by the nature of Android itself.
Remote intrusion of mobile devices is actually pretty rare. The most common ways bad actors get ahold of sensitive user information are: phishing, user-approved permissions on questionable apps such as TikTok, and "connected" social media accounts, where users allow websites and apps access to their social media profiles, or use their social media as a login.
Regardless, to the technical point of the matter, grayed out app permissions are not the result of hacking or surreptitious malfeasance, but rather the nature of the "rules" inherent to Android - you can't remove system apps or disable system-controlled permissions without root.
If you still think you have reasons for concern, this is my only suggestion:
Change your phone number
Immediately change all relevant passwords - minimum 10 characters, a mix of upper case, lower case, numbers, and special characters, do not reuse them
Enable 2 factor authentication on all accounts, ensuring your 2nd factor is something that you and only you have access to
Once done, sign out all devices signed into those accounts
Perform a factory reset on your device; even better, reflash factory firmware. Keep bootloader locked.
Do not use questionable apps

Categories

Resources