Root Access By: Derek Grove. What Do I Mean By Root?  An account that by default has access to all commands and files on a linux or other Unix-like operating.

Slides:



Advertisements
Similar presentations
COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
Advertisements

Chapter 1: Voilà! Meet the Android
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Objectives Overview Define an operating system
Understand Database Security Concepts
Chapter One The Essence of UNIX.
System Software © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
CMPTR1 CHAPTER 3 COMPUTER SOFTWARE Application Software – The programs/software/apps that we run to do things like word processing, web browsing, and games.
Guide To UNIX Using Linux Third Edition
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Installing software on personal computer
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
ANDROID PROGRAMMING MODULE 1 – GETTING STARTED
SMARTPHONE OPERATION SYSTEM MARKET IN U.S. Ryan (Jang-Hoon) Doo ISM 158.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
UFCFX5-15-3Mobile Device Development Android Development Environments and Windows.
Objectives  Understand the purpose of the superuser account  Outline the key features of the Linux desktops  Navigate through the menus  Getting help.
Test Automation For Web-Based Applications Portnov Computer School Presenter: Ellie Skobel.
Operating Systems Chapter 4.
Learning Outcomes At the end of this lesson, students should be able to: State the types of system software – Operating system – Utility system Describe.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Lesson 8 Operating Systems
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
A-Level Computing types and uses of software. Objectives Know that software can be split into different categories Know what each type of software is.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Computing Essentials 2014 System Software © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized.
Explain the purpose of an operating system
1 Tradedoubler & Mobile Mobile web & app tracking technical overview.
© 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Android Boot Camp.
Operating System What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. An operating.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
Chapter Two Exploring the UNIX File System and File Security.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
EMBEDDED OPERATING SYSTEMS. DEFINITION An embedded operating system is a system for embedded computer systems These operating systems are designed to.
Operating Systems Morrison / WellsCLB: A Comp Guide to IC 3 3E 1 Morrison / Wells.
Information Systems Design and Development Technical Implications (Software) Computing Science.
WELCOME. Mobile Application Development Dreamsoft4u.
By Collin Donaldson.   In conventional OS architectures, the user accesses the OS via an account that has certain privileges (admin, guest). They can.
Master Software Solutions Pvt.Ltd.. These days the demand of smart phone is being increased and we have different types of client e.g. Touch Phone, tables,
1 Lesson 8 Operating Systems Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
OPERATING SYSTEMS (OS) By the end of this lesson you will be able to explain: 1. What an OS is 2. The relationship between the OS & application programs.
How to root Android Phone and Tablet for free and safe.
2Operating Systems  Program that runs on a computer  Manages hardware resources  Allows for execution of programs  Acts as an intermediary between.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Course : PGClass : MCA Subject: Operating SystemSub.Code : 3CT11 Staff Name : S.SomasundaramYear & Sem : II nd & III rd.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Computer System Structures
Mobile Device Development
Mobile Hacking - Fundamentals
System Software Chapter 4.
Development Environment
IC3 GS5 Certification Guide
Jailbreaking vs. Rooting
Active Directory Administration
Introduction To Networking
Introduction to Computers
Jailbreaking the iPhone
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
Chapter 4.
Lesson 8 Operating Systems
User accounts.
User accounts.
Presentation transcript:

Root Access By: Derek Grove

What Do I Mean By Root?  An account that by default has access to all commands and files on a linux or other Unix-like operating system  Root account, root user, SuperUser  Most privileged account on the system, has absolute power over it.  Ability to modify the system in any way  The root account is the only account with write permissions  The ability to modify files in the root directory

Root Directory  Top level directory on a system  identified by a forward slash ( / )  Unix-like operating systems are designed with a tree-like structure  Sub directories branch off  Only accessible by the rooted user

Reasoning Behind The Root User  Since the beginning (Unix days), systems were set up as a multi-user system  Each user was connected to the mainframe computer by a fairly simple terminal  The root user took on administrator roles  Granting and/or revoking privileges  Updating the systems  Control of the sub directories (normal users)  Bottom Line: Keep ordinary users from messing up the critical parts of the system and to files belonging to other users

Rootkit  Set of software tools installed by an intruder that allows to use the system for its own purposes.  Designed to obtain root access  Although they are usually meant for harm, they can be used to enhance our experiences with things such as mobile devices.  As in use the rootkit to bypass the restrictions set by the developers

Going From $ To #

Benefits of SU(SuperUser) Abilities  Back-up and Tethering  Custom ROMs  Able to defy GUI restrictions  Emulators  IDEs (Interactive Development Environment)  Access to more tools and utilities  Performance Optimization

Moto x: 1 st Customized Phone…

… I’d Beg To Differ

High level languages supported after root  IDEs provide a centralized software in which a programmer can modify, compile, deploy and debug software  The IDE I find to be most flawless is C4droid  Programming by phone or computer, the results are the same.

Emulators  Software that duplicates the desired system in another system  The Guest (duplicated system) must be a less intricate system so the host system can process it  Often for convenience purposes, having multiple systems integrated into one device  Can be used for professional manners such as a TI calculator emulator. Or could be used to re-live the childhood memories with emulators dating from the Atari to the PlayStation one

Apple: Jailbreaking  Gaining access to the entire Unix file system  Endless possibilities to the experienced developer  A lot more “buggy”, due to the complexity of the scripts required  More prevalent to becoming a “brick”  Brick is a common slang term in the rooting world, to describe a device as defective (i.e. it is no more than a brick) 

Jailbreaking Process  Download the rootkit on your computer  Run through the kit’s process where it will run scripts that will hack your device to its desired stage.  Once your device is jailbroken, a tether option is available, which will lock the script so it is still jailbroken even after a reboot.  Use the to….  Download an SSH(Secure Shell) client to populate your device with saved data.  iTunes will not correctly restore your data after it has been jailbroken

Jailbreaking Process: Continued  It is impertinent to change the default password of “alpine” to a more personal means of a password.  Leaving your device “open” leaves you vulnerable at every level  Install other commonly wanted apps such as Winterboard Vshare

Complex Theme For iPhone 

Utilities That Came From The Underground Market  Everything that you can do on your new IOS 7 software, I could do on my 2 nd generation jailbroken iPod Touch  There are many pre-installed features in todays mobile devices that came from the freedoms that hackers provided developers with.  The utilities/tools category has especially grown from the underground market - Flashlight - Screen Capture - Screen Lock(finger lock) - Widgets - WiFi Tethering - Task Killers

Apps  Software that is compatible with a handheld device  Ex.  Apple – iTunes App Store  Android – Google Play  Blackberry – BlackBerry App World  Windows – Windows Phone Store

3 rd Party Apps – For Good  Applications that are distributed outside of the devices’ applications provider(s)  These are the applications of which root users have privileges to  Without root access, the apps are unable to execute due to the platform’s pre set restrictions

3 rd Party Apps – Ethical Contradictions  Along with root access is the ability to download and INSTALL pirated apps.  I emphasize “install”, because anyone can download pirated apps, but normal users cannot bypass the installation restrictions.  Mobile app development is still a relatively new way of programming  It takes a great deal of time to develop the software, and the developers deserve compensation or at least some sort of recognition for it.  So although some find themselves rooting their devices solely on the fact of “free apps”, this could lead to development problems in the future.

Summary  Root access gives you total control of a systems  If there are systems in a network, and you alone are the SU, you can access every piece of information in that network  The power of the SU is endless  We can especially see that with mobile devices, completely altering the restrictions established by the developers

Works Cited    touch/ touch/  