3.2 Bypass detections
3.2.1 SSL PINNING
3.2.2 ROOT DETECTION
3.2.3 EMULATOR DETECTION
Identify any detection
grep -Ei "isEmulator" -Ei "root" -Ei "carrierNameFromTelephonyManager" -Ei "smellsLikeAnEmulator" -Ei "SystemProperties" -R . grep -Ei "build.fingerprint" -Ei "build.hardware" -Ei "product.kernel" -Ei "product.brand" -Ei "product.name" -Ei "product.model" -Ei "product.manufacturer" -Ei "product.device" -Ei "Emulator" -Ei "qemu.hw.mainkeys" -Ei "bootloader" -Ei "bootmode" -Ei "secure" -Ei "build.version.sdk" -R .grep -Ei "generic" -Ei "unknown" -Ei "google_sdk" -Ei "Android SDK built for x86" -Ei "Genymotion" -Ei "google_sdk" -Ei "goldfish" -R .Know your own environmental values
adb shell getprop ro.product.nameadb shell getprop ro.product.deviceadb shell getprop ro.product.modelRecompile:
Sign apk (key-creation + signing):
Install apk:
INFO
THINGS TO REPORT
If bypassing the emulator detection by simple code-tampering is possible!
MORE DETAILS
Last updated
Was this helpful?