AAXH

warning: Creating default object from empty value in /home/linweb42/p/papermint-designs.com-1087254664/user/htdocs/community/modules/taxonomy/taxonomy.module on line 1390.

Awesome Android eXtreme Hacking. Part III. What a Shell!

Awesome Android eXtreme Hacking Part I HeaderAwesome Android eXtreme Hacking Part I Header


NOTE
This article has already been moved to the our new blog. Please update any link to this post as it will be removed in the future. This post is available clicking the link below:

http://papermint-designs.com/dmo-blog/2016-04-awesome-android-extreme-hacking--part-iii--what-a-shell

So, you had notice we are using the shell a lot. If you are used to work on a standard UNIX shell you had also noticed that the Android command line is really limited. Well, somehow, that makes sense for a consumer electronics device like a phone. Most of the users won't ever notice that. However, us, the chosen wannabes, really want a more powerful shell on our phone.... Such a thing is possible and it is called Busybox.

Awesome Android eXtreme Hacking. Part II. More sensors

Awesome Android eXtreme Hacking Part I HeaderAwesome Android eXtreme Hacking Part I Header


NOTE
This article has already been moved to the our new blog. Please update any link to this post as it will be removed in the future. This post is available clicking the link below:

http://papermint-designs.com/dmo-blog/2016-04-awesome-android-extreme-hacking--part-ii--more-sensors

Yes, we know. You had a very bad time waiting for this new AAXH issue. OK, sorry about that.... and do not worry, AWESOMENESS CONTINUES!. If you are reading this, you are probably following this awesome tutorial on how to badly hack into your phone. In that case you might had been wondering why some of your sensors were not producing data or why they just do it sometimes and some other times they don't.

Awesome Android eXtreme Hacking. Part II (Sensors)

Awesome Android eXtreme Hacking Part I HeaderAwesome Android eXtreme Hacking Part I Header


NOTE
This article has already been moved to the our new blog. Please update any link to this post as it will be removed in the future. This post is available clicking the link below:

http://papermint-designs.com/dmo-blog/2016-04-awesome-android-extreme-hacking--part-ii-sensors

Welcome back to the Awesome Android eXteme Hacking Tutorial. Hope you are ready for some more awesomeness :). In the last issue (http://papermint-designs.com/community/node/419) we learn how to create and run a C application on our Android phone. That allows you to build almost any application that does not require access to special features on your phone, in other words, pretty much any standard console based UNIX application.

Now we are going one step further hacking into your phone sensors. Yes, you phone is full of sensors and peripherals: Buttons, Touchscreen, accelerometers, gyroscopes and even temperature and pressure sensors. Android provides APIs to access those sensors from Java in a convenient way, but we want to hack into them, because that is a lot more awesome!... So, let's start.

Awesome Android eXtreme Hacking. Part I

Awesome Android eXtreme Hacking Part I HeaderAwesome Android eXtreme Hacking Part I Header


NOTE
This article has already been moved to the our new blog. Please update any link to this post as it will be removed in the future. This post is available clicking the link below:

http://papermint-designs.com/dmo-blog/2016-04-awesome-android-extreme-hacking--part-i

So you'd got here because of the catchy title?. Good luck!, you are in the right place. You had just landed in the first part of a series of awesome tutorials on how to extreme hack your Android devices. Yes it is extreme, so let's start straight away. The first thing you have to know is that... your Android phone is actually a Linux computer!. Yes, it is. And that is the reason we can do quite some amazing things just out of the box.... Interested?... Keep reading

Syndicate content