Originally Posted by darker_slayer
Can either of you smart folks post a link to a thread where someone is using a dissassembler or sniffer like softice, ida pro, diver to look at what vroot is requesting on the pc side? Seems that these two root programs have found a usable exploit that gets around knox, selinux, etc, but have been found to request a little too much during the process. I've been reading the forums and searched around, but if you know where this is being discussed please link. Thanks in advance
OK, I'll try to be more helpful.
The issue is that vroot is pulling things from the network over an encrypted connection, so it's going to be hard to grab the content of what it's downloading to the phone. I don't know if it's downloading directly to the phone or creating temporary disk files with the exploit. If the latter, then it would be possible to keep it from deleting those files and disassemble them. However, the only way you're going to know is to let it run and that's a bit too scary for me.
Another possibility - probably more useful - would be to capture all of the USB traffic between the PC and the phone. I've looked into software that supports that and just need to find some time to play around. Once we know what's being pushed to the phone, it's possible to reverse engineer it.
There's a few threads discussing vroot, but nothing so far that I've found where there's an organized effort to reverse it.
So far, my attempts at rooting not using vroot have been failures. I'm still trying to get something to work, but I fear that SELinux is going to defeat me.
My Android devices:
vzw Samsung Galaxy S4 stock MJ7, now rooted!
Samsung Galaxy Tab 2 10.1, also stock but rooted.
VZ Droid Incredible 2 rooted but otherwise stock.
Samsung Galaxy Tab 10.1