Skip to content

[Question] how to reverse the exploit? #6

@Bakr-Ali

Description

@Bakr-Ali

First of all, I'm a noob with some experience in linux & adb commands & Shizuku, and stumbled upon this project and thought (from its description) that it is essentially like getting root access without actually rooting the device and tripping the knox hardware thing.

So I tried it and followed the in-app instructions to downgrade whatever SMT is (I have no idea) and grant Shizuku permission. I tried the local shell (ls -a command) but got permission denied. So, I uninstalled the app as I didn't want to do anything further since I don't have knowledge about it and its risks.

Now, how do I reverse the downgrade of SMT so that my device is less vulnerable? And is that the only thing that I should reverse or did the app do other things that should be reversed too?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions