mercredi 31 décembre 2014

Reverse-engineer FOTA token


With a HTTP sniffer I have found out that the FOTA update client on my CAT B15Q (Android 4.4.2, app "com.fw.upgrade") contacts the URL "http://ift.tt/1zSCY1M" with a POST payload containing IMEI, serial number, SIM number and GSM network operator.


It gets returned a session ID and a "random" value, which is then apparently used in the request to "http://ift.tt/1vHwix5" to compute the "token" value (the token must be "valid" or the server throws a "token invalid" error).


The question is now, how is this "token" value computed? The responsible function in HttpManager apparently calls getInt("randomToken") on a sharedPreferences object obtained by paramContext.getSharedPreferences("fota", 1);.


However, in /data/data/com.fw.upgrade there is no shared_preferences xml file... so how do I find out where this token value is computed?





Aucun commentaire:

Enregistrer un commentaire