User:Chipmunk: Difference between revisions
From Somewhat Obscure Computing
Jump to navigationJump to search
Created page with "Hello. I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices. Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024<!-- as of writing this, last..." |
No edit summary |
||
| Line 5: | Line 5: | ||
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024<!-- as of writing this, last year -->, and have since learned many things. I am also still quite new to low-level programming and reverse engineering. | Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024<!-- as of writing this, last year -->, and have since learned many things. I am also still quite new to low-level programming and reverse engineering. | ||
Some things I aim to do eventually: | |||
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my Verizon Galaxy Core Prime, AT&T Galaxy S5, and AT&T Samsung Gear S. | * Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my Verizon Galaxy Core Prime, AT&T Galaxy S5, and AT&T Samsung Gear S. | ||
* Reverse engineer Samsung's reactivation lock (<code>libterrier.so</code>?). | * Reverse engineer Samsung's reactivation lock (<code>libterrier.so</code>?) and document it (that's where the 'obscure' in 'Somewhat Obscure Computing' comes from - I doubt this feature is well documented!). | ||
* Figure out the 'sboot' file format, and how the included symbols come into play | |||
* Use a particular exploit (forgot the URL) to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible). | * Use a particular exploit (forgot the URL) to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible). | ||
* Port an EFI implementation to an x86 phone (Asus Z00D). | |||
* Look into unlock methods for various phones... (I own too many). | * Look into unlock methods for various phones... (I own too many). | ||
Revision as of 18:13, 26 June 2025
Hello.
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.
Some things I aim to do eventually:
- Port galaxy_s5_dev_tree_appended_bug to my Verizon Galaxy Core Prime, AT&T Galaxy S5, and AT&T Samsung Gear S.
- Reverse engineer Samsung's reactivation lock (
libterrier.so?) and document it (that's where the 'obscure' in 'Somewhat Obscure Computing' comes from - I doubt this feature is well documented!). - Figure out the 'sboot' file format, and how the included symbols come into play
- Use a particular exploit (forgot the URL) to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible).
- Port an EFI implementation to an x86 phone (Asus Z00D).
- Look into unlock methods for various phones... (I own too many).