Termux has wrapper "su" in /data/data/com.termux/files/usr/bin
And this path is in PATH variable
Termux has wrapper "su" in /data/data/com.termux/files/usr/bin
Because there are only su in /sbin... Just did what @zgfg did for his comparison... However w/-a
, same result:
View attachment 5647487
PW
Sure; but fact is many banks do do this (detect mount 'leaks' etc), which is why vvb2060 and other LSP Devs experimented w/ unshare modules, Magisk Lite etc, and why they've incorporated such functionality in Canyie's Shamiko and Magisk Bravo now...@zgfg @pndwal
How does hiding root work?
When target app on hidelist / denylist is opened, Magisk will immediately unmount Magisk tmpfs mountpoint, dummy skeleton tmpfs and magisk created mount bind so there are no /sbin/su or /system/bin/su (Android 11+) in target apps.
See the source code:
Denylist unmount: zygisk/deny/revert.cpp
MagiskHide: magiskhide/hide_policy.cpp
Momo is abusing isolated process and app zygote process to bypass MagiskHide and detect Magisk. And the fact that not all banking apps use isolated process or app zygote.
This app uses correct methods to detect root and Xposed, but the goal is not to against root or Xposed.
By making detection methods public (some methods are private), our goal is to improve user knowledge and force the community to make correct improvements...
Scanning proc mount leeks is no longer possible on Android 8+ and proc is mounted with hidepid=2 flagfact is many banks do do this (detect mount 'leaks' etc), which is why vvb2060 and other LSP Devs experimented w/ unshare modules
Still, if "abusing isolated process and app zygote process to bypass MagiskHide and detect Magisk" can be done, why is this abuse for Momo where the stated goal is "making detection methods public... to improve user knowledge and force the community to make correct improvements"?...Scanning proc mount leeks is no longer possible on Android 8+ and proc is mounted with hidepid=2 flag
And... Aren't there already 3rd modules that workaround this issues??Still, if "abusing isolated process and app zygote process to bypass MagiskHide and detect Magisk" can be done, why is this abuse for Momo where the stated goal is "making detection methods public... to improve user knowledge and force the community to make correct improvements"?...
Isn't the point that if it can be done by Momo, at least some banks will try it? PW
// Ensure separated namespace, allow denylist to handle isolated process before Android 11
if (args->mount_external == 0 /* MOUNT_EXTERNAL_NONE */) {
// Only apply the fix before Android 11, as it can cause undefined behaviour in later versions
char sdk_ver_str[92]; // PROPERTY_VALUE_MAX
if (__system_property_get("ro.build.version.sdk", sdk_ver_str) && atoi(sdk_ver_str) < 30) {
args->mount_external = 1 /* MOUNT_EXTERNAL_DEFAULT */;
}
}
Just like Canyie's Bravo Magisk I mentioned?And... Aren't there already 3rd modules that workaround this issues??
Bonus: You can make DenyList to handle isolated process by just adding a small code into zygisk/hook.cpp
// Ensure separated namespace, allow denylist to handle isolated process before Android 11 if (args->mount_external == 0 /* MOUNT_EXTERNAL_NONE */) { // Only apply the fix before Android 11, as it can cause undefined behaviour in later versions char sdk_ver_str[92]; // PROPERTY_VALUE_MAX if (__system_property_get("ro.build.version.sdk", sdk_ver_str) && atoi(sdk_ver_str) < 30) { args->mount_external = 1 /* MOUNT_EXTERNAL_DEFAULT */; } }
which -a suYou should usewhich -a su
to see all the directories in your path containing su, not just the first one.
As you stated, you only updated Magisk APPLICATION, not the Magisk itself...The problem is that it restricts my ability to install apps from "unknown sources."
I connected my computer to my phone and did a "adb install magisk.apk" for the canary app. The problem is that after doing this, while it states that it was successful, the app still says that I need to upgrade the app...
Yes my company's Intune blocks installing from unknown sources even on my personal side.As you stated, you only updated Magisk APPLICATION, not the Magisk itself
Magisk main window, doesn't it show you Update at the top?
And btw, what does it show for your version of Magisk, vs the version of Magisk app?
They should be the same - see my screenshot
If Magisk version is older, it will show you Update on the right, you should click on that Update and do eg Install Direct
Please read Installation documentation on Magisk Github to understand that what is Magisk app vs the Magisk itself
---
You could google for Install from unknown sources or for Install unknown apps to find how to enable (on A8+ it is disabled by default, for all apps)
Hopefully, your Intune does not block you from enabling. If it does, your adb workaround is nice![]()
Please look at your screenshot. It shows everything - please readYes my company's Intune blocks installing from unknown sources even on my personal side.
I downloaded the latest version of Canary from the Github........That is what I installed via adb install magisk.apk, and this is what shows in my magisk:
View attachment 5647573
LSPosed released new Shamiko which fixed Found zygisk for latest Momo but the banking apps that won't run with zygisk enabled like Livin by Madiri still not open.
...ItsMe unfortunately still detects rootLSPosed released new Shamiko which fixed Found zygisk for latest Momo but the banking apps that won't run with zygisk enabled like Livin by Madiri still not open.
![]()
Releases · LSPosed/LSPosed.github.io
Contribute to LSPosed/LSPosed.github.io development by creating an account on GitHub.github.com
Shamiko only hide "found zygisk" for Momo 4.3.1, it cannot comepletely hide
Latest Shamiko Changelog
Shamiko already cannot hide zygiskRikka has removed Shana's note stating "Some modules like "storage-isolation-enhanced" will reveal the existence of Zygisk", since release, so seems she's fixed issue in her Storage Isolation app enhancement...PW
'The girls squad' attacked Rikka too now?Latest Shamiko Changelog
### 0.5.1
- Support Magisk 25+
Nb. Rikka has removed Shana's note stating "Some modules like "storage-isolation-enhanced" will reveal the existence of Zygisk", since release, so seems she's fixed issue in her Storage Isolation app enhancement...
Update shamiko_changelog.md
RikkaW committed 2 hours ago
PW
Not sure how to test, but basic rule is Any launched with Android 10+ and Legacy ramdisk devices updated to/running Android 10+ and Pixel 3/3a series devices. Those launched with Legacy SAR (generally Android 9), apart from Pixel 3/3a series which were "retrofitted" by Google and the exception, are "stuck" as Legacy SAR boot type devices... PW
To extract img files from payload.bin you have to use Payload Dumper. There are several threads (under different devices) with download links on XDA (you should search for) - for Windows, Linux, even for Android (not working great with bin files of several GBs), and with instructionsNo, I did not extract it from the lineage zip.
I am unable to mount the payload.bin in windows, and it errors out on me when I try and use 7zip to open it up.
Bit vague on your setup now...I read the instructions but got swayed by another post elsewhere where it was stated that instaling the apk first and renaming it as zip and then sideloading has worked for someone quite well. So out of laziness I did the same process and found that it all installed without any errors.
Could this be the contributing factor with my adopted storage issues which I did not experience earlier? Also, I am experiencing some wierd problems with bluetooth where I can connect using bluetooth to most devices but if I try to connect to another android device it attempts to pair and then fails without any errors. Fortunately, haven't experienced any other major issues.
You can use Uninstall Magisk from App; Nb. Restore Images leaves android configuration in /data/adb, so you'll want to take Complete Uninstall... (Or, if you first want to test if issue is that magisk.db or other config files are corrupted / causing issues, with root explorer or twrp simply delete everything in /data/adb and reboot and magisk daemon will rebuild config files... You'll have cleanly installed root and modules, superuser, deny lists etc will be gone too...)What is the correct un-installation procedure for Magisk? I would like to uninstall and re-install as per the official method to see whether my issues will go away.
To extract img files from payload.bin you have to use Payload Dumper. There are several threads (under different devices) with download links on XDA (you should search for) - for Windows, Linux, even for Android (not working great with bin files of several GBs), and with instructions
Link to my copy (for Windows) I downloaded months ago from XDA and happily used couple of times:
6.44 MB file on MEGA
mega.nz
Using the payload.bin extractor that zgfg recommended, patching the boot.img, and flashing it via recovery. Didn't know the lineageos had an extractor for this.
No, I did not. As I mentioned, I took the quick and dirty option since someone posted that it worked of them without any issues and now I know that it was the wrong choice!First, I asked : Did you ever use App to patch images? (Answer will eliminate some possible issue causes...)
Magisk has nothing to do with File Based Encryption on Data and Storage.However, since the system is already rooted using Magisk shouldn't these folders be unencrypted?
/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,inlinecrypt,reserve_root=32768,resgid=1065,fsync_mode=nobarrier latemount,wait,check,formattable,fileencryption=aes-256-xts:aes-256-cts:v2+emmc_optimized+wrappedkey_v0,keydirectory=/metadata/vold/metadata_encryption,metadata_encryption=aes-256-xts:wrappedkey_v0,quota,reservedsize=128M,sysfs_path=/sys/devices/platform/soc/1d84000.ufshc,checkpoint=fs
fileencryption=aes-256-xts:aes-256-cts:v2+emmc_optimized+wrappedkey_v0
They're not chasing root users. They just want a guarantee that the device is secure, and they have good reason to. Rooting by nature compromises device security.Its trivial to sniff or even MITM a desktop, or even just run WinPE and reset admin password and use the users own saved passwords in their browser, heck even export their passwords....
In any event the biggest risk vector is social engineering
Chasing root phone users only gives them a "feelgood", it does nothing to stop genuine misuse and fraud, at all.....
I dont see Google or a bank sending out a representative every time someone makes a transaction to see if theyre genuine....trying to control the device is attacking the wrong end of the transaction and is ultimately pointless
Did you have Magisk App hidden when updated?... Classic trap... Supposed to work, but bit like a pot-luck dinner...I had root, a few apps still recognize it, updating to the newest magisk manager shows n/a for magisk installed. Do I just grab my boot IMG out of my ROM and do it sgain? Will I keep all my data and info...?