Skip to content
This repository

Phone to Phone Android Debug Bridge - A project for "debugging" phones... from other phones.

branch: master

Merge pull request #13 from nddrylliog/patch-1

Typo in README (an -> and)
latest commit 4f4d6b9674
Kos authored
Octocat-spinner-32 AntiGuard Fixed AntiGuard push I made earlier... *sigh* September 20, 2012
Octocat-spinner-32 includes Added includes/adb-arm-static - A statically compiled adb binary for … October 08, 2012
Octocat-spinner-32 modules -Dynamic module loading at runtime is now a thing, woot! September 22, 2012
Octocat-spinner-32 LICENSE Added getGesture to get the code of the gesture. September 29, 2012
Octocat-spinner-32 README.md Merge pull request #13 from nddrylliog/patch-1 November 12, 2012
Octocat-spinner-32 functions.sh fixed my own breaking of generateGAUTH.sh October 22, 2012
Octocat-spinner-32 generateGAUTH.sh Update generateGAUTH.sh October 24, 2012
Octocat-spinner-32 getData.sh Reworked the root check. August 25, 2012
Octocat-spinner-32 getGesture.sh Added getGesture to get the code of the gesture. September 29, 2012
Octocat-spinner-32 getGoogleData.sh Changed getting data from com.google.* to com.google.*/{shared_prefs,… October 31, 2012
Octocat-spinner-32 getJpgs.sh Added underlying functionality for more flexible 'find' searches. Cur… May 08, 2012
Octocat-spinner-32 getPhotos.sh Turns out the version of sh I'm testing against doesn't support read -p May 08, 2012
Octocat-spinner-32 getSensitive.sh Fixed issue #2 by Hackrylix. Now gets JB user's accounts.db September 29, 2012
Octocat-spinner-32 installAnti.sh Fixed issue #2 by Hackrylix. Now gets JB user's accounts.db September 29, 2012
Octocat-spinner-32 root4.x.sh Fixed issue #2 by Hackrylix. Now gets JB user's accounts.db September 29, 2012
Octocat-spinner-32 run.sh Turns out the 4.x root was fixed in 4.1.2. Updated menu to reflect that. October 23, 2012
Octocat-spinner-32 testDynLoad.sh fixed my own breaking of generateGAUTH.sh October 22, 2012
README.md

p2p-adb Framework

Phone-2-Phone adb Framework - A project for "debugging" phones... from other phones.

A loose framework to assist in pulling data, making system changes, etc, with minimal user input.

Media

  • Featured on Hak5 (hak5.org)
  • Presented at DerbyCon 2012 (irongeek.com)
  • DerbyCon 2012 slides (kyleosborn.com) (PDF)

Goal/Reason

Attacking another device by plugging directly into it has always been something I thought would be movie hacker cool.

The real idea is that: Someone leaves their phone at the table, locked, and only for a few minutes. You pull your phone out, plug them together, and hope to god that have USB debugging enabled (all custom ROMs do.) Slurp down their files, stick your own backdoors there, and you're set to go!

Took me about 45 seconds to copy over 62MB of com.android.google.* databases and user_prefs files (from encrypted Galaxy Nexus to unencrypted Galaxy Nexus, but running AOKP Milestone 5).

A Framework?

Yes, because as devious as I might think I am (and I am), I'm certain others have more clever ideas than mine.

As this project develops, it will form more into a framework, providing tools necessary to quickly, and sanely, allow users (i.e. you) to create scripts as easily as possible.

Requirements

Most of the scripts should be doable by both PC and an Android phone.

Note: This was designed for sh (not bash/dash/ksh/etc). I can't guarentee functionality will work across the shells.

Android requires:

  • An install has/supports adb (I believe stock comes with adb, otherwise you could probably add it)
  • An install that supports USB host mode
  • A phone that supports USB host mode (hardware support)
  • Root
  • Busybox
  • A terminal emulator
  • Probably a USB On the Go cable
  • Check out Hak5's micro-micro USB cable: Hak5 Shop

PC requires

  • Android SDK (specifically, you nee adb)
  • adb needs to be in $PATH
  • Something that will interpret shell scripts (I'm looking at you, Windows users. cygwin should work)

Running

  • Copy to phone
  • su
  • sh ./run.sh
  • profit

Targets known to be working:

  • AOKP Milestone 5
  • CyanogenMod

Targets that still have some issues:

  • Stock Android (Still figuring out the best methods to re-implement everything with a limited shell environment)
  • Note! Stock Android is now working, busybox is now PUSHED to the device

As necessary, I'll start expanding and building checks against certain ROMs/toolkit versions to create maximum damage.

AntiGuard

AntiGuard is an Android app I wrote that will assist you in unlocking a phone.

Since ADB doesn't always give you root, you might be limited in what you can do. However, the standard ADB shell user is also very powerful.

  • AntiGuard is now built into the regular toolset!

  • To install AntiGuard, you simply need to run

    • adb install AntiGuard/AntiGuard.apk
  • To unlock the screen once install

    • adb shell am start -S io.kos.antiguard/.unlock
  • To uninstall, hit the uninstall button, or run this command

    • adb ununinstall io.kos.antiguard

Credits

Note: If you're looking to report a bug, please use the issue tracker in GitHub. Support can also be found that way.

Me, you're welcome. @theKos

Email

License

GPLv3

Something went wrong with that request. Please try again.