Saturday, 9 May 2015

Unresponsive touchscreen FIX for OnePlus One!

Several OnePlus One users have reported this rather annoying glitch when screen becomes unresponsive after a while. Everything seems to be working fine exepct the touchscreen, which stays unresponsive and the only way to fix this is to reboot the device. If you're experiencing such issues, here's a fix for you!

The solution is only temporary and users will probably have to wait for another software update fixing this issue but it seems to be working just fine.

The key to fix this is executing the following command into the terminal:
cat /sys/class/input/input0/baseline_test

To make this automated, you can use Tasker and create this specific task for command execution every time the screen turns ON.

Open Tasker, add a new profile, navigate to state -> display -> display state, choose ON, then create a new task.

Add an action code -> run shell and input the command cat /sys/class/input/input0/baseline_test which will be executed when the screen turns ON. Make sure root option is ticked and profile with the task is activated. You're good to go!

You might want to check the quick video by +Greg Ives if you're unsure about the guide.
https://plus.google.com/+GregIvesgrives/posts/g1hWuhdEyNx


Don't have Tasker? You might consider buying it! Tasker adds automatic tasks (that you create), events, triggers, whatever you don't want to do manually anymore, Tasker will do for you!

Download Tasker on Google Play

Saturday, 2 May 2015

Reverse Engineering - How Android apps get hacked?

Reverse engineering is the process of "disassembling" a software followed by certain edits and moficiation that aims to recover what's behind the interface and a fully functional app. People who do this process, however, are planning to change the software's source code and exploit the app. Software cracks, keyloggers, those all are products of revers eengineering. As you might guess, reverse engineering can be quite dangerous for us - the users.)

Security is obviously the number one priority. Although we are all trying to protect our personal data as much as possible, it's still not effective enough.


 

Here's a little info from Arxan Technologies showing us that 70% of Apple apps have been in some way hacked and 95% of apps have been hacked on Android.
The question stays, is really hacking & modifying (or injecting a malicious code) an app that easy?
Let's have a look.



Here's another quick video showing the decompilation of an application using the dex2jar and JD-GUI which shows the source code of the decompiled app.

You can use the same thing using Show Java on Android, download on Google Play


The code gets changed, app compiled and released to the public. You can't spot the difference as the app is behaving normally but your personal data may get stolen.

These threads may be everywhere, for example if you like to download paid apps for free on the web (APK file), these also may be modified.

Tuesday, 28 April 2015

Create your own Flappy Bird version with FlappyCreator!

Remember that game, Flappy Bird? Yeah, it's been a while. And did you know you can actually create your own Flappy Bird version, with custom images, title, background or even sounds? Take a look at FlappyCreator!

FlappyCreator.com is a web where you can crete your very own Flappy Bird version. Create your bird, change the background or even those known ring sounds!


Step 1, game info. Name your game, sign yourself as the author, and write the intstructions.


Continue modding the pictures, add your custom ground, background, tubes and choose your own bird.

Finally, change the audio! Got some funny noises? Add them there!

Too lazy? Don't worry, there's a "random" section with all the Flappy Bird modifications that you can try out, take a look here!


Go to Flappycreator.com and start now!

Show us what you got! Mention Android Hackz on G+ or Tweet @MiraVitula and share your creations!


Sunday, 26 April 2015

Android WiFi Hacking - How an MITM attack works?

zANTI, Dsploit, Csploit, Faceniff and many, many more similar hacking apps are using a specific kind of attack called MITM - the Man In The Middle attack. What exactly does this attack do and is there any way to protect yourself from it? Read on!

Man In The Middle aims to control a victim by becoming the "man in the middle". Let's make an example.

We got person A and person B. Let's name them Rami and Jovie. They're friends and just chatting through an unencrypted connection (http). Alice wants to hang out, says:

 - Sup Jov, gimme your public key, I want to chat!

Rami is requesting a Public key (known as asymmetric cryptography - used to encrypt data and verify them as a digital signature)

Rami and Jovie don't know one thing. There's an evil person Miro intercepting everything they say.
What happens here is that the sent message goes first to Miro and then gets sent to Jovie. He doesn't spot anything, the message is the same, nothing's really suspicious at the moment.
Jovie responds:

- Yo Ramy, let's chat. Here's my key: materialFTW123

Miro now knows the Jovie's public key but instead of sending this key directly to Rami, he sends his own public key. Miro slightly edits the message:

- Yo Ramy, let's chat. Here's my key: motiondesignFTW123

Now they can encrypt the whole conversation with their private encrypt alghoritm. However, they don't know there's someone who's edited it so he can view and control the whole conversation between these two guys.

- [encrypted with Miro's key] Let's hang out, bring some booze lol

Miro then encrypts it to Jovie's original key (materialFTW123) so he doesn't spot a thing. Then he resends it to Jovie and the conversation goes on.


..

This way the attacker can take control over a conversation and not only he can intercept it but also change it. Boom, we have redirect, script injection, replace images and many more features.


Here's a screen from MITM section in cSploit app. There are several MITM features starting from innocent "simple sniff" that sniffs through the traffic and monitors up/down, and password sniffer, that inputs passwords from the victims.


Now, is there any way to protect from these attacks? Yup, and it's not difficult at all.

Firstly, be sure to be on HTTPS. You can always check it in he URL bar. There's a feature SSLStrip that prevents from connecting to HTTPS but it cannot redirect you to HTTP while on HTTPS. So if you're on HTTPS, you're good to go.

Use WiFi Protector. WiFi protector is a handy app for your Android device that monitors the net and alarms you if there's an intruder (also shows his MAC/IP adress and can even protect you from the atttack if you're rooted). Download

Try not to connect to public networks - they're the biggest threat. But fortunately these attacks are not that often and you shouldn't really catch a hacker if you're mostly on private WiFis.



Tuesday, 21 April 2015

MonsterUI - And Xposed Module that will add Lollipop look to your older Android!

Since the Android Lollipop release, many legacy device owners are now "jelly" about the new Material Design look that's been spreading like a disease these days. If you're one of them, don't worry, there's still hope! It's called MonsterUI.

MonsterUI uses the well-known Xposed Framework, so it's really easy to use it.



For those that don't know what Xposed is, take a look here.
To enable MonsterUI, simply install the app, enable the Xposed module and reboot.
Enjoy!

(Module should work on ICS,JB and KitKat).

Download MonsterUI (official thread, find more information here)

Thursday, 9 April 2015

Francisco Franco launches a new app - Servicely!

Francisco Franco, the author of amazing Franco Kernel for Nexus devices and developer of FKU app, Peek, Nexus Display Control and many more just released his new app called Servicely.

Servicely does one simple job. The app launches a service every 60 seconds and check for the apps you have in the list. If the apps are running, Servicely kills them. However, if the app runs in a foreground service, the app won't be affected.

Servicely does almost the same thing as Greenify app does, it has beautiful design and it's free.
If you ever left your phone overnight and got 50% drain because of the useless apps running in the background, I ensure this won't happen anymore with Servicely.


[root] Servicely - screenshot thumbnail[root] Servicely - screenshot thumbnail



Tuesday, 7 April 2015

Save battery on AMOLED screens by turning off pixels!

As you might know, super AMOLED screens are the ones that can turn OFF pixels when showing black color. This makes the color much more realistic, deeply saturated and look just better compared to other types of screen. And one thing more, it does save battery. So ..why should you keep the unecessary pixels runnin'?

There's this handy little app called Pixel OFF Save Battery AMOLED, which as you might guess turns off "unecessary" pixels on your AMOLED display. And how the app does it?

Pixel OFF Save Battery AMOLED - screenshot thumbnailPixel OFF Save Battery AMOLED - screenshot thumbnailPixel OFF Save Battery AMOLED - screenshot thumbnail

Now if you check the screenshots above, you might already guess of what's going on here. The app creates a mesh based on three different levels. Because of the high density displays nowadays, you won't probably even see the the "Mesh 1" but what it actually does, is that it creates and turns off a few pixels in a little mesh on your display.

Mesh 2 followed by Mesh 3 are a bit more aggresive, turning off a much greater area of pixels on your displays making it less comfortable to look on but the battery life will last a lot longer than ever before.

Despite the beautiful Material interface of the app, it doesn't cause any problems, bugs and it's easy to use and pretty understandable.

Note the app will only work on AMOLED-powered devices but if you still want to give it a shot (for some reason), you can download the app and see for yourself (the mesh will be visible even on non-amoled screens but I experience some weird ghost touches on my G3..huh)

Download on Google Play
https://play.google.com/store/apps/details?id=com.anrapps.pixelbatterysaver