What's new

[ Shizuku, Termux] Samsung Exploit 1000 uid

Au4elio

Leecher
Joined
Jan 7, 2024
Posts
2
Reaction
0
Points
2

Future Rooting Method... For Samsung

The Elite && Aú4elio

System3 brings back the System User Exploit


HI guys :) Kasama pala ako sa pag-diskobre ng Exploit na to mga kasama ko mga developer and exploiter rin sa ibang-bansa :)

Share ko lang to'ng Exploit na to na affected ang Samsung.

Screenshot_20240107-133604_Terminal Emulator.jpg


Ang 1000 uid ay parang adb shell pero mas mataas sya, sabihin na natin na pwede nyang galawin yung mga System files

Example na pwede nyang i-manipulate = /cache /omr /carrier /efs /data/system /data

At pwede rin syang pang palit ng "csc" o mag install ng "dsu" aka dalawang rom na naka install sa Isang device

Tutorial :

●Download my Zip file

●Gawa kanang folder na pangalan ay "Exploit"
Screenshot_20240107-135854_ZArchiver.jpg


● Copy mo lang yung laman ng Zip file sa ginawa mong "Exploit" Folder

Shizuku+Termux user =

Screenshot_20240107-134804_Termux.jpg


Sa mga "Adb" user nman =
"adb shell"
"cd /sdcard/Exploit"
"sh test"

Tapos nyan guys. Long press nyo lang yung "Home button" ito na yung lalabas

Screenshot_20240107-135416_FTL.jpg


Oks na 🥳🥳🥳
 

Attachments

/sdcard/Exploit $ adb shell
r0q:/ $ cd /sdcard
r0q:/sdcard $ cd Exploit/
r0q:/sdcard/Exploit $ ls
README.txt ftl.apk test.bak
factory_ftl_default.xml test
r0q:/sdcard/Exploit $ sh test
Made by @
Failure [not installed for 0]
SUCCESS
Error: Unable to open file: com.sec.android.preloadinstaller
Consider using a file under /data/local/tmp/
Error: Can't open file: com.sec.android.preloadinstaller

Exception occurred while executing 'install':
java.lang.IllegalArgumentException: Error: Can't open file: com.sec.android.preloadinstaller
at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:701)
at com.android.server.pm.PackageManagerShellCommand.doRunInstall(PackageManagerShellCommand.java:1591)
at com.android.server.pm.PackageManagerShellCommand.runInstall(PackageManagerShellCommand.java:1557)
at com.android.server.pm.PackageManagerShellCommand.onCommand(PackageManagerShellCommand.java:249)
at com.android.modules.utils.BasicShellCommandHandler.exec(BasicShellCommandHandler.java:97)
at android.os.ShellCommand.exec(ShellCommand.java:38)
at com.android.server.pm.PackageManagerService$IPackageManagerImpl.onShellCommand(PackageManagerService.java:7084)
at android.os.Binder.shellCommand(Binder.java:1104)
at android.os.Binder.onTransact(Binder.java:914)
at android.content.pm.IPackageManager$Stub.onTransact(IPackageManager.java:4905)
at com.android.server.pm.PackageManagerService$IPackageManagerImpl.onTransact(PackageManagerService.java:7068)
at android.os.Binder.execTransactInternal(Binder.java:1380)
at android.os.Binder.execTransact(Binder.java:1311)
The exploit is done
But still not 100% done
Exploiting...
Exploit injected
Pls.. long press the home button
1|r0q:/sdcard/Exploit $



help



Screenshot_20240225_235536_Termux.jpg

I guess the signature is not the same as my ftl.apk, but what is the com.sec.android.preloadinstaller for?
 

Attachments

Last edited:
Back
Top