Skip to content

Working and Nonworking Apps

David Refoua edited this page Dec 4, 2019 · 15 revisions

Apps successfully tested with RootCloak

[1] Default app in RootCloak

Apps not working in RootCloak (reason TBD)

Apps with calls most likely can never be directly intercepted by Xposed

  • WebTV - Stofa - https://play.google.com/store/apps/d...om.stofa.webtv
    Method: Detects root by checking for the existance of the su binary. It uses fopen() and access() in order to do this check via native library (built with Android NDK).
  • Yelo TV - Telenet - https://play.google.com/store/apps/d...e.telenet.yelo
    Method: Detects root via native library (built with Android NDK). Unsure of exact method, but the strings "ERROR: Device is rooted. aborting execution" and "ERROR: Debbuger running. aborting execution" can be found in the library.
    Relevant Files: libDxDrmDlcCore.so
  • Sky Go - BSkyB - https://play.google.com/store/apps/d...om.bskyb.skygo
    Method: Most likely detects root via native library (built with Android NDK). Unsure of exact method, but the Java portion of the app contains "VGDRM_STATUS_DEVICE_IS_ROOTED = -41942891", and based on the library name, it's a safe bet.
  • Barclays Mobile Banking - Barclays - https://play.google.com/store/apps/d...smobilebanking
    Method: Most likely detects root via native library. Using FileObserver you can see it accessing /system/(x)bin/su, but since I am hooking all File constructors and exec() methods, there is no way it is done without the native library.
  • S-pushTAN - Star Finanz GmbH - https://play.google.com/store/apps/d...ndroid.pushtan
    Reason: Uses a native library to check for root. There is a callback inside the Java code, so it's possible to intercept that at the Java level, but that can be patched fairly easily.
    Relevant Files: libshield.so
  • Pokemon Go Reason: SafetyNet

Apps that need more testing/analysis

Clone this wiki locally