AASA & ASKSManager:
Back in January & February of 2023, at the height of the rediscovered system shell, Samsung introduced the patch known as the One UI 5.1 SMT patch. That patch stopped anymore downgrading of the Samsung-text-to-talk application that was used to gain access to what many know as a system shell. When it was released it ultimately crippled the known exploit at the time. But it wasnt, until a certain unknown individual, made public what is now known as this on XDA
adb install -d -i com.sec.android.preloadinstaller /path/to/SMT.apk
pm install -d -i com.sec.android.preloadinstaller /path/to/SMT.apk
When executed, it would allow for SMT to be fully downgraded to again allow access to system uid capabilities whether by using any of the known available apps that worked side by side with SMT,
Apps available at the time
- Shizuku 1000 aka ShizukuHack by Z. Wander
- K0mraid3s System Shell
- SMT Shell by BluFeNiX
- SMT Shell for SamsungWatches
- system_shell_2
Fast forward to APRIL/MAY 2023, when Samsung decided to not fix their own issues and leave Papa Google to handle it. Google went ahead and made the appropriate framework changes to SHUT everything down as far as downgrades even if the vendor, like Samsung, had hidden overrides, thus ONLY ALLOWING debuggable apps to downgrade past factory images with or without the use of the -d or -i flags.
Many will wonder, what does any of this have to do with system3, well its plain and simple. The argument used for the One UI 5.1 patch,
-i com.sec.android.preloadinstaller
Belongs to a little file on about 95 to 99 percent of Samsung devices called "ASKSTS.xml" easily located by executing the following command on your device command line,
cat /etc/ASKSTS.xml
Opening up the XML, you will be greeted with the following words, "TRUSTEDSTORE"
#system3 is the "ShellActivity" of FactoryTestLauncher. FTL is what Samsung uses as its main launcher on combination firmware, even including on today's combo firmware. FactoryTestLauncher holds a system uid of 1000. Just like many system applications. Typically when installing, applications like this or any past and even present system applications thru the command line, you're met with the error of:
[-3001: INSTALL_FAILED_REJECTED_BY_BUILDTYPE]
TO BYPASS THE -3001 ERROR....USE THE FOLLOWING COMMAND:
adb install -i PrePackageInstaller /path/to/combo.apk
pm install -i PrePackageInstaller /path/to/combo.apk
Either download the apk of FTL to your device and/or PC and push FTL to /data/local/tmp or download any system apps within your devices platform signature (there's about 3) and install with ease.
As I previously stated, theres about 3, maybe more platform signatures that Samsung uses to sign their system packages. The following is one of the more known signatures that Samsung uses ok their flagship devices. So use accordingly!
If you don't know what signature your device holds, STOP RIGHT HERE and LEAVE. This is not a exploratory group or resource for ANY user to use. If you're here, it's because you have an idea or know something at least about SMT, system shells, platform signatures or the SAMSUNG LEAK, etc. If you have no clue, please save yourself the headache.
While, many NOW have FTL installed, thats only half the battle. To open the "ShellActivity" of FTL, the activity has to be called from uid 1000 or something HIGHER THAN SHELL. I'll let you use your imagination on how that could be launched. There's a couple ways to do this. Do your research and you too can be successful.
When your SUCCESSFUL in launching, you will be met with the following screen,
THE INSTALL COMMAND IS NOW PATCHED ON ANY FIRMWARE, WITH A SECURITY PATCH OF AUG 1, 2023 OR NEWER. IT IS ALSO PATCHED, EVEN IF ASKSTS.XML IS SHOWING THE 3 PACKAGES.
Special Thanks to SJ Park for the following ....
If you have ever taken a deep look of FTL, you might be wondering why FUNC tab is empty. This is because it determines what to show based on xml file. Seeing FTL code carefully, you'll find out that FTL tries to read xml from 3 locations:
/sdcard/factory_ftl_default.xml /sdcard/factory_ftl_wifi.xml /system/factory/factory_ftl.xml
We do not have w
access to /system while we do for /sdcard.
Simply put that xml to /sdcard and you can check now FUNC has something.
You'll be able to find out remaining easily. Now you can open shell if you are SUPER_MODE, I already modified the xml.
I'll just leave this here since its PUBLIC KNOWLEDGE and for those wondering why "PrePackageInstaller" no longer works.
As this project, has taken off, it has come to my attention, of the abuses, this may lead to or what a system shell can get you or what you're able to bypass. Let me be the first to say, that l,
DO NOT SUPPORT, OR CONDONE, IN ANY ACTIVITY OR ACTIVITIES THAT INVOLVE THE BYPASS OF ANY SECURITY MECHANISM, INCLUDING BUT NOT LIMITED TO THOSE OF "KG", "KNOXGUARD", "MDM", "PAYJOY", "MKOPA".
Nothing goes unpunished without consequences. It's people like those in that community that ultimately ruin and hinder FUTURE exploits or privilege escalation methods from being released. And that goes to show, why their hasnt been much movement on the repo.
As many are aware, the project no longer has the original 'OperationSamsungsLullaby' zips or any of the Non-Galaxy zips. I do not plan on reintroducing those zips back again. If there was something you may have wanted or needed, then look around, they cant be too hard to find. Use your brainpower to find your answers. No one is going to do it for you.
I do have, something, to introduce today. And those are what I call the "#system3 Power Pack".
THESE APPS ARE FOR THOSE DEVICES LIKE THE S23 ULTRA, S22 ULTRA, FOLD 4, FOLD5...etc
THERE WILL NO LONGER BE ANY UPDATES FOR NON-GALAXY DEVICES
The power pack will NOT WORK on NEW SECURITY nor will it WORK on Non-Galaxy devices that carry a different signature. However, there are some tricks, that can LEAD YOU all the way up to the One UI 6 Jan. Security patch. As I previously stated many times. Make SURE all the apps from the zip folders are installed. REMOVE anything you don't want. I ultimately did my best to include any apps in the zips, where i feel, like there's a possible privilege escalation that could be found or where i believe the door was left wide open. It's solely up to you to figure out how its done.
The combo apps SHOULD and WILL install on vulnerable firmware (July 2023 or older) using the PrePackageInstaller command....
The wait is over!
Leaving off from where I stated that things are patched as of the release of July 2023 firmware, was a partial lie. Now granted, I gave more than enough time to let things settle down and well frankly, things keep going up and up and up. So consider this update, more as an AWARENESS TO THE PUBIC that believes companies like SAMSUNG are secure and hold their customers values at heart and keep them fully secure. I am living proof, that a nobody, with ZERO schooling in coding and absolute ZERO prior knowledge on the command line, can gradually learn and pick up on the failures that SAMSUNG believes they have patched. not once, twice but three separate times. And frankly, to spawn system shells including on their beloved One UI 7 thats currently under beta testing (Beta 2, as of this writing) is hilarious and more than anything just outright SAD.
But enough with the serious talk. Today, I will only speak on one of several failures and in the coming weeks, I will lay out more and more.
"Make SURE all the apps from the zip folders are installed."...is probably the best advice I have ever given. And i hope many people paid attention because it's worth more than anything.
In one of zip folders, there was a particular APK. And the package name of the apk, is called "com.sec.android.preloadinstaller". If the name rings a bell to you then congratulations, you paid attention. During my ongoing trials and fallout from Mr. Snakes On A Plane, I discovered something extremely crucial. Now while Samsung did their best on patching the flaws of ASKSTS.xml. They managed to screw up their very own patch job, when I discovered the abilities of having "com.sec.android.preloadinstaller", the actual APK installed on any device including if it was already PrePackageInstaller patched. If you have that specific APK installed, it doesn't matter what version (because there are several). You can now have the abilities that were patched, brought back to life.
TO GET THE ABILITIES BACK FROM BEING PATCHED AFTER THE JULY (PPI) PATCH, MAKE SURE YOU HAVE THE ACTUAL APK OF "com.sec.android.preloadinstaller" INSTALLED ON YOUR DEVICE. THEN EXECUTE THE FOLLOWING COMMANDS BELOW.
adb install -i com.sec.android.preloadinstaller /path/to/combo.apk
pm install -i com.sec.android.preloadinstaller /path/to/combo.apk
Once executed, you should see the words of "Success". CONGRATULATIONS, you just now bypassed a billion dollar companies security mechanism, all with the help of a no school NOBODY....
You're welcome folks! Stayed tuned for more in the coming weeks. NO ETAS plz.
As Always, --wr3cckl3ss
#We_Are_Elite
ALL previous commands from the past system shells still work.
Kindly use Google or your preferred search provider to find them.
Oakieville (https://www.github.com/oakieville/)
Zachary Wander (https://www.github.com/zacharee/)
BLuFeNiX (https://github.com/BLuFeNiX/)
SJ Park (https://github.com/seojun0924/)
The Elite
Hell's Gate
B. Pwrs
This project includes THREE zip folders of a collection of APKs from
factory combination firmware:
#system3-pt_1.zip
#system3-pt_2.zip
#system3-pt_3.zip
New LATEST , FTL signed by Samsung and PPI Vulnerable;
FTL_2.4.03.apk