![]() I may be used wrong term, but the intention here is to use tcpdump for diagnostic purposes (see comments). Linux localhost 4.9.112-perf+ #1 SMP PREEMPT Tue Nov 17 00:51: aarch64 Androidīypassing does not mean "exploiting". ![]() So is there a way to bypass permission on not-rooted devices? After which the owner is me, and the mod of the binary is: -rwxrwxr-x 1 u0_a236 everybody 836K Feb 8 13:24 tcpdumpīut even with the ownership, the same permission error. The binary owner was root and was located in /data/data/com.termux/files/usr/bin/tcpdump so I decided the root privilege won't be necessary after I mv it to my home directory. Tcpdump: wlan0: SIOCETHTOOL(ETHTOOL_GLINK) ioctl failed: Permission denied ![]() So if I try to run it on termux: $tcpdump -ni any tcp and port 12345 ![]() I can have tcpdump binary installed, but my (android) OS is not rooted. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |