Termux has wrapper "su" in /data/data/com.termux/files/usr/bin
And this path is in PATH variable
Termux has wrapper "su" in /data/data/com.termux/files/usr/bin
Because there are only su in /sbin... Just did what @zgfg did for his comparison... However w/-a
, same result:
View attachment 5647487
PW
Sure; but fact is many banks do do this (detect mount 'leaks' etc), which is why vvb2060 and other LSP Devs experimented w/ unshare modules, Magisk Lite etc, and why they've incorporated such functionality in Canyie's Shamiko and Magisk Bravo now...@zgfg @pndwal
How does hiding root work?
When target app on hidelist / denylist is opened, Magisk will immediately unmount Magisk tmpfs mountpoint, dummy skeleton tmpfs and magisk created mount bind so there are no /sbin/su or /system/bin/su (Android 11+) in target apps.
See the source code:
Denylist unmount: zygisk/deny/revert.cpp
MagiskHide: magiskhide/hide_policy.cpp
Momo is abusing isolated process and app zygote process to bypass MagiskHide and detect Magisk. And the fact that not all banking apps use isolated process or app zygote.
This app uses correct methods to detect root and Xposed, but the goal is not to against root or Xposed.
By making detection methods public (some methods are private), our goal is to improve user knowledge and force the community to make correct improvements...
Scanning proc mount leeks is no longer possible on Android 8+ and proc is mounted with hidepid=2 flagfact is many banks do do this (detect mount 'leaks' etc), which is why vvb2060 and other LSP Devs experimented w/ unshare modules
Still, if "abusing isolated process and app zygote process to bypass MagiskHide and detect Magisk" can be done, why is this abuse for Momo where the stated goal is "making detection methods public... to improve user knowledge and force the community to make correct improvements"?...Scanning proc mount leeks is no longer possible on Android 8+ and proc is mounted with hidepid=2 flag
And... Aren't there already 3rd modules that workaround this issues??Still, if "abusing isolated process and app zygote process to bypass MagiskHide and detect Magisk" can be done, why is this abuse for Momo where the stated goal is "making detection methods public... to improve user knowledge and force the community to make correct improvements"?...
Isn't the point that if it can be done by Momo, at least some banks will try it? PW
// Ensure separated namespace, allow denylist to handle isolated process before Android 11
if (args->mount_external == 0 /* MOUNT_EXTERNAL_NONE */) {
// Only apply the fix before Android 11, as it can cause undefined behaviour in later versions
char sdk_ver_str[92]; // PROPERTY_VALUE_MAX
if (__system_property_get("ro.build.version.sdk", sdk_ver_str) && atoi(sdk_ver_str) < 30) {
args->mount_external = 1 /* MOUNT_EXTERNAL_DEFAULT */;
}
}
Just like Canyie's Bravo Magisk I mentioned?And... Aren't there already 3rd modules that workaround this issues??
Bonus: You can make DenyList to handle isolated process by just adding a small code into zygisk/hook.cpp
// Ensure separated namespace, allow denylist to handle isolated process before Android 11 if (args->mount_external == 0 /* MOUNT_EXTERNAL_NONE */) { // Only apply the fix before Android 11, as it can cause undefined behaviour in later versions char sdk_ver_str[92]; // PROPERTY_VALUE_MAX if (__system_property_get("ro.build.version.sdk", sdk_ver_str) && atoi(sdk_ver_str) < 30) { args->mount_external = 1 /* MOUNT_EXTERNAL_DEFAULT */; } }
which -a suYou should usewhich -a su
to see all the directories in your path containing su, not just the first one.
As you stated, you only updated Magisk APPLICATION, not the Magisk itself...The problem is that it restricts my ability to install apps from "unknown sources."
I connected my computer to my phone and did a "adb install magisk.apk" for the canary app. The problem is that after doing this, while it states that it was successful, the app still says that I need to upgrade the app...
Yes my company's Intune blocks installing from unknown sources even on my personal side.As you stated, you only updated Magisk APPLICATION, not the Magisk itself
Magisk main window, doesn't it show you Update at the top?
And btw, what does it show for your version of Magisk, vs the version of Magisk app?
They should be the same - see my screenshot
If Magisk version is older, it will show you Update on the right, you should click on that Update and do eg Install Direct
Please read Installation documentation on Magisk Github to understand that what is Magisk app vs the Magisk itself
---
You could google for Install from unknown sources or for Install unknown apps to find how to enable (on A8+ it is disabled by default, for all apps)
Hopefully, your Intune does not block you from enabling. If it does, your adb workaround is nice![]()
Please look at your screenshot. It shows everything - please readYes my company's Intune blocks installing from unknown sources even on my personal side.
I downloaded the latest version of Canary from the Github........That is what I installed via adb install magisk.apk, and this is what shows in my magisk:
View attachment 5647573
LSPosed released new Shamiko which fixed Found zygisk for latest Momo but the banking apps that won't run with zygisk enabled like Livin by Madiri still not open.
...ItsMe unfortunately still detects rootLSPosed released new Shamiko which fixed Found zygisk for latest Momo but the banking apps that won't run with zygisk enabled like Livin by Madiri still not open.
![]()
Releases · LSPosed/LSPosed.github.io
Contribute to LSPosed/LSPosed.github.io development by creating an account on GitHub.github.com
Shamiko only hide "found zygisk" for Momo 4.3.1, it cannot comepletely hide
Latest Shamiko Changelog
Shamiko already cannot hide zygiskRikka has removed Shana's note stating "Some modules like "storage-isolation-enhanced" will reveal the existence of Zygisk", since release, so seems she's fixed issue in her Storage Isolation app enhancement...PW
'The girls squad' attacked Rikka too now?Latest Shamiko Changelog
### 0.5.1
- Support Magisk 25+
Nb. Rikka has removed Shana's note stating "Some modules like "storage-isolation-enhanced" will reveal the existence of Zygisk", since release, so seems she's fixed issue in her Storage Isolation app enhancement...
Update shamiko_changelog.md
RikkaW committed 2 hours ago
PW
Not sure how to test, but basic rule is Any launched with Android 10+ and Legacy ramdisk devices updated to/running Android 10+ and Pixel 3/3a series devices. Those launched with Legacy SAR (generally Android 9), apart from Pixel 3/3a series which were "retrofitted" by Google and the exception, are "stuck" as Legacy SAR boot type devices... PW
For riru users, this can be bypassed with MomoHider so this detection is meanless btwI too never use she/their injected telemetry releases, i was just referring to her wording 'R.I.P MagiskHide' as you quoted and tested her newest Magisk Detector v3.0 with said, but no prove that MagiskHide detected as promoted
Why do you continue this theme... I never read where John Wu said it either; just hearsay...
This:
... Are you using 1735a713-alpha?
According to @huskydg however, 'original MagiskHide' is just replaced with 'logcat method based MagiskHide'...
https://forum.xda-developers.com/t/...orks-by-vvb2060-support.4424845/post-87262393
Anyway, we were simply reporting the TG message re. "MagiskHide detection method and code used by momo have been made public"... And I don't use or test Alpha currently... PW
This:Here i tried her 'codes' (not her hands), even w/o adding it to MagiskHide's list, no detection or whatever she calls that makes 'R.I.P MagiskHide'
... Are you using 1735a713-alpha?
They're not chasing root users. They just want a guarantee that the device is secure, and they have good reason to. Rooting by nature compromises device security.Its trivial to sniff or even MITM a desktop, or even just run WinPE and reset admin password and use the users own saved passwords in their browser, heck even export their passwords....
In any event the biggest risk vector is social engineering
Chasing root phone users only gives them a "feelgood", it does nothing to stop genuine misuse and fraud, at all.....
I dont see Google or a bank sending out a representative every time someone makes a transaction to see if theyre genuine....trying to control the device is attacking the wrong end of the transaction and is ultimately pointless
@pndwal You can build Magisk app with custom name and label as you want
Still not sure what you're trying to tell me...MagiskHide is still effective to hide root from banking apps. It's not dead if you don't care about safetynet stuff.
Shamiko is taking off your panties on the basic of MagiskHide. So MagiskHide is still better.
You believe Shamiko too much, It can't really hide zygisk, only fix the zygisk detection of Momo. However, I can't blame it because that was the nature of zygisk and it will never be fixed.
Let's not forget the security issues that rooted devices present. App developers for the aforementioned banks, etc are extremely concerned with operating in a secure environment. You wouldn't want a third party to be able to view, let alone manipulate, your financial transactions, but a rogue process with root permissions could potentially do exactly that - read account numbers, command unauthorized transactions, and worse. Think of it like a malware browser extension that could give a remote party access to your bank account.I'm also done with this conversation, because you seem to be going out of your way to be obtuse about it. You specifically mentioned that rooted users are a microscopic minority. None of these corporations enacting the security measures are going to go out of their way to make security exceptions for the tiny fraction of android users that are rooted users.