Application checks rooted device
Application checks rooted device
Description
Presence of strings and methods indicating check for Rooted or Jail-broken devices.
The absence of the Jail-broken or Root detection is not a vulnerability, but its presence remediates the impact of certain vulnerability classes or threats.
Recommendation
Root detection on Android can be done using the RootBeer library, can use to a certain extent the SafetyNet
API to ensure the device profile is known and approved or can perform manual checks like:
- File presence of common Rooted files like
/sbin/suor/system/app/Superuser.apk - Check
suis in thePATH - Check for
supersuin the running processes - Check installed application against a list of known root apps like
eu.chainfire.supersu - Check for writable partitions and system directories
iOS can apply the same concept to check for Jailbreak presence:
- File presence of common Jailbreak files like
/Applications/Cydia.app - File permissions writing to locations outside the application sandbox
- Protocol handlers added by Cydia