You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.MD
+19-3Lines changed: 19 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -11,24 +11,38 @@ Since it's operating within ramdisk, this tool can bypass most root checks, inte
11
11
Unlike its predecessor, this rootkit can bypass SafetyNet, since it doesn't need to modify system partition. \
12
12
However, it can't bypass hardware checks, such as hardware-backed SafetyNet on newer devices.
13
13
14
-
The daemon is a custom executor (sort of a service manager) for an arbitrary payload.
14
+
The daemon launches arbitrary executable in loop, while providing cover and execution control.
15
15
It runs silently and normally leaves no traces in _dmesg_, _logcat_, etc., unlike regular services run by _init_ in loop.
16
16
17
17
FURA uses SELinux to its own advantage: not only to bypass stock policy restrictions, but to hide itself from the rest of the system.
18
18
19
19
This tool, like its predecessor, is based on [Magisk](https://github.com/topjohnwu/Magisk) source code, but does not necessary require root or Magisk preinstalled on the device.
20
20
It mostly uses a part of MagiskInit to patch SELinux policies.
21
21
22
+
#### Tested on:
23
+
24
+
OS | Android | Boot scheme
25
+
---|---|---
26
+
MIUI 11.0.2 | 7 | rootfs
27
+
LineageOS 17.1 | 10 | 2SI
28
+
LineageOS 19.0 | 12 | 2SI
29
+
22
30
## Features & Improvements
23
31
24
32
- Installs entirely into _/boot_, does not modify _/system_ in any way
25
33
- Operates in ramdisk without touching storage
26
34
- Employs a custom daemon to monitor payload execution
27
-
- Leaves no init logs
28
35
- Modifies SELinux policy to hide itself
29
36
- Installation and backup no longer depend on _/data_
37
+
- Installation takes much less time
30
38
- Cut artifacts and unused code left from Magisk
31
39
40
+
## Limitations
41
+
- Incompatible with Magisk, causing bootloop
42
+
- Not hidden from root (files, mounts, etc.)
43
+
- On some systems _logcat_ may log random service name on boot
44
+
- Sockets (if any) are not hidden, though specific process using network is
45
+
32
46
## Prerequisites
33
47
34
48
- Python 3
@@ -120,7 +134,9 @@ After installation, backups will be saved automatically.
120
134
`reinstall.sh` to reinstall quickly (if you have the backup).\
121
135
`uninstall.sh` to restore original boot image from backup.
122
136
123
-
#### _Warning_: avoid double installation as it will cause bootloop!
137
+
#### In case installation script crashes, make sure you pull backups manually when prompted!
138
+
139
+
#### _Warning_: avoid double installation as it will cause bootloop! Reinstall (uninstall and install again) instead.
Copy file name to clipboardExpand all lines: revshell/Payloads.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Payloads tested:
12
12
13
13
#### Logcat writer
14
14
15
-
The stock payload that simply writes stuff to logcat:
15
+
Stock payload that simply writes stuff to logcat:
16
16
```
17
17
$ adb logcat | grep revshell
18
18
03-18 00:34:46.884 3197 3197 D revshell: Start successfull!
@@ -39,10 +39,10 @@ However, even static build may have very limited functionality because of compat
39
39
40
40
#### Reverse SSH
41
41
42
-
This payload ([link]()) has better compatibility with Android and seems to work reliably, though it might be a bit tricky to use.
42
+
This payload ([link](https://github.com/Fahrj/reverse-ssh)) has better compatibility with Android and seems to work reliably, though it might be a bit tricky to use.
43
43
`upx_reverse-ssh-armv8-x64` version is recommended.
44
44
45
-
Set LHOST and LPORT in `config.prop`.
45
+
For reverse shell, set LHOST and LPORT in `config.prop`. Otherwise it will act as bind shell (default port: 31337).
0 commit comments