Android Directory Structure data - app: User-installed applications
- data: application-specific folder
- system: system configuration information, registry file
- anr: anr abnormal record information
dev:devices abbreviation - Store files corresponding to the device
mnt: abbreviation of mount - Devices mounted on the system: sdcard, USB flash drive
proc: hardware configuration, status information sbin: system bin - System-important binary executable files
- adbd: server's adb process
system: - app: stores system applications, which cannot be deleted by default
- bin: executable linux command file in Android
- etc: host: mapping of host name and IP address
- fonts: Android's own fonts
- Framework: stores the Java API provided by Google
- lib: class library of core functions, C/C++ files
- media/audio: stores Android sound effect files
- tts: speech engine, does not support Chinese by default
- usr: configuration information of user equipment, mapping of keyboard encoding and key encoding
- xbin: binary instructions for developers
Linux instructions under Android su:superuser rm: remove, delete files ls: List all files and folders in a directory cd: Switch to a directory - ls -l: View detailed information of a file
- ls -a: View hidden files
cat: View file contents - cat filename
- Do not cat binary executable files
mv: move changes the file name - mv original file name new file name
mkdir: create a folder rmdir: delete a folder touch: create a new file chmod: change mode, switch file access permissions echo: echo data; redirect data sleep: sleep for a few seconds df: Display the capacity of the specified directory id: print the id of the current user ps: list all processes running in the system - uid=0:root
- uid=1000:system
- uid=2000:shell
- uid=10000+: general application ID
kill: kill the process with the specified pid chown: change owner, modify the owner mount: mount the file system - mount -o remount rw /: Mount the current directory with read and write permissions
- mount -o remount rw /system: Remount the specified directory
Android-specific instructions am: ActivityManager, which can perform operations related to activity - am start -n com.itheima.createfile/com.itheima.createfile.MainActivity: Start the specified Activity
- am kill com.itheima.createfile: end the non-foreground process
- am force-stop com.itheima.createfile: end the process
pm:PackageManagermonkey -p com.itheima.createfile 1000: Automatically click the specified application 1000 times - pm disable package name: freeze the specified application
- pm enable package name: unfreeze the specified application
Flash the emulator, write rom files (su) - If you want a real phone to run these commands, the phone must have root permissions
- Root flashing principle: copy the su binary file to /system/bin or /system/xbin
- Android rooting software works by exploiting system vulnerabilities.
- rom: can be understood as the installation file of the Android system
- Write the su file and superuser.apk into the img file
- Execute the su command
Runtime.getRuntime().exec("su"); Small case: freeze and thaw application Freeze and unfreeze specified apps - RootTools.sendShell( "pm disable " + package, 300000); RootTools.sendShell( "pm enable " + package, 300000);
Small case: Reading user privacy data with zero permissions Directly modify the SMS database access permissions - RootTools.sendShell( "chmod 777 data/data/com.android.providers.telephony/databases/mmssms.db" , 300000);
- SQLiteDatabase db = SQLiteDatabase.openDatabase( "data/data/com.android.providers.telephony/databases/mmssms.db" , null , SQLiteDatabase.OPEN_READONLY);
- Cursor cursor = db.query( "sms" , new String[]{ "body" , "address" }, null , null , null , null , null );
- while( cursor .moveToNext()){ String body = cursor .getString(0);
- String address = cursor .getString(1); System. out .println(body + ";" + address); }
- RootTools.sendShell( "chmod 660 data/data/com.android.providers.telephony/databases/mmssms.db" , 300000);
Silent installation Why is there a need for silent installation? Automatically download the application and then install it silently - Official application. Electronic market, convenient for users to install silently
- Rogue software. Downloaded and installed secretly in the background.
- //Silent installation RootTools.sendShell( "pm install sdcard/flowstat.apk" , 30000);
- //Open RootTools.sendShell( "am start -n com.jijian.flowstat/com.jijian.flowstat.TrafficWidgetSetting" , 30000);
- //Uninstall application RootTools.sendShell( "pm uninstall com.jijian.flowstat" , 30000);
- //Delete the downloaded apk package RootTools.sendShell( "rm sdcard/flowstat.apk" , 30000);
Modify font - Brush the ttf file into img
- The default Chinese font for Android system is DroidSansFallBack.ttf
- Replace this file with the font ttf file you want to use.
Modify boot animation - Get bootanimation.zip from the real machine
- Put bootanimation.zip into the system/media directory
Remove lock screen password Delete the key file under data/system - The text password is password.key
- The gesture password is gesture.key
|