Home

Awesome

p2p-adb Framework

Phone-2-Phone adb Framework - A project for "debugging" phones... from other phones.

A loose framework to assist in pulling data, making system changes, etc, with minimal user input.

Media

Goal/Reason

Attacking another device by plugging directly into it has always been something I thought would be movie hacker cool.

The real idea is that: Someone leaves their phone at the table, locked, and only for a few minutes. You pull your phone out, plug them together, and hope to god that have USB debugging enabled (all custom ROMs do.) Slurp down their files, stick your own backdoors there, and you're set to go!

Took me about 45 seconds to copy over 62MB of com.android.google.* databases and user_prefs files (from encrypted Galaxy Nexus to unencrypted Galaxy Nexus, but running AOKP Milestone 5).

A Framework?

Yes, because as devious as I might think I am (and I am), I'm certain others have more clever ideas than mine.

As this project develops, it will form more into a framework, providing tools necessary to quickly, and sanely, allow users (i.e. you) to create scripts as easily as possible.

Requirements

Most of the scripts should be doable by both PC and an Android phone.

Note: This was designed for sh (not bash/dash/ksh/etc). I can't guarentee functionality will work across the shells.

Android requires:

PC requires

Running

Targets known to be working:

Targets that still have some issues:

As necessary, I'll start expanding and building checks against certain ROMs/toolkit versions to create maximum damage.

AntiGuard

AntiGuard is an Android app I wrote that will assist you in unlocking a phone.

Since ADB doesn't always give you root, you might be limited in what you can do. However, the standard ADB shell user is also very powerful.

Credits

Note: If you're looking to report a bug, please use the issue tracker in GitHub. Support can also be found that way.

Me, you're welcome. @theKos

Email

License

GPLv3