3.2 Bypass detections
3.2.1 SSL PINNING
TBD soon
3.2.2 ROOT DETECTION
TBD soon
3.2.3 EMULATOR DETECTION
Identify any detection
A lot of applications try detecting an emulator by querying known system values.
Know your own environmental values
In order to bypass it:
Know your values (have a look above)
Modify the code accordingly, so YOUR device's values pass the validation
Recompile project
Sign apk
Install and give it a try
Recompile:
Sign apk (key-creation + signing):
Install apk:
INFO
No 100% success guaranteed
There might be fancy solutions out there (appreciate any input here)
If it is heavily obfuscated -> good luck with that
Emulator detection usually comes w/ root detection as well (give it a try, before you cry)
The grep commands above do search for known method-names or values which might get executed/checked on app-startup
THINGS TO REPORT
If bypassing the emulator detection by simple code-tampering is possible!
MORE DETAILS
Last updated