@@ -5,13 +5,13 @@ Language/[日本語](Readme-ja.md)
55
66## Overview
77
8- Android 14 or later has difficulty installing to trusted Root certificates .
8+ Android 14 and later make it difficult to install a trusted Root certificate on the system .
99
1010- https://httptoolkit.com/blog/android-14-breaks-system-certificate-installation/
1111
12- Show how to bypass restrictions .
12+ Describe the steps to bypass.
1313
14- ## bypass point
14+ ## Bypass point
1515
1616API-34 has been reading certificates from "/apex/com.android.conscrypt/cacerts" in the process of reading system certificates.
1717However, when the system property is set to "system.certs.enabled", the code is to retrieve certificates from "/system/etc/security/cacerts/".
@@ -50,6 +50,8 @@ setImmediate(function () {
5050````
5151
5252In this case, the Frida script must be specified at startup.
53+ It is also inconvenient for use with multiple applications.
54+
5355Android XposedModule has created an always available application.
5456
5557The created XposedModule app is placed in the "OverrideSysPropModule/app/release" folder.
@@ -60,14 +62,13 @@ The created XposedModule app is placed in the "OverrideSysPropModule/app/release
6062
6163For emulators, install Magisk according to the following procedure.
6264
63- 1 . https://github.com/newbit1/rootAVD Perform git clone from
65+ 1 . Do a git clone from https://github.com/newbit1/rootAVD
6466
6567```
6668git clone https://github.com/newbit1/rootAVD.git
6769```
6870
69712 . Start the emulator.
70-
71723 . Execute the following command from PowerShell on the administration screen to confirm the ADV to be installed.
7273
7374``` sh
@@ -89,19 +90,45 @@ rootAVD.bat system-images\android-34\google_apis_playstore\x86_64\ramdisk.img In
8990rootAVD.bat system-images\a ndroid-34\g oogle_apis_playstore\x 86_64\r amdisk.img InstallPrebuiltKernelModules GetUSBHPmodZ PATCHFSTAB DEBUG
9091```
9192
92- 4 . Download the latest Magsisk
93+ 4 . run ADV corresponding to API
94+
95+ ``` sh
96+ .\r ootAVD.bat system-images\a ndroid-34\g oogle_apis_playstore\x 86_64\r amdisk.img FAKEBOOTIMG
97+ ```
98+
99+ A 60-second wait is performed, which is terminated by pressing the Enter key.
100+
101+ ``` sh
102+ [! ] Temporarily installing Magisk
103+ [* ] Detecting current user
104+ [-] Current user 0
105+ [-] Starting Magisk
106+ [* ] Install/Patch /sdcard/Download/fakeboot.img and hit Enter when done(max. 60s)
107+
108+ 5. Download Magisk
93109
94110- https://github.com/topjohnwu/Magisk/releases
95111
96- 5 . copy the downloaded Magisk application to the folder "rootAVD/Apps"
97- 6 . install Magisk including the latest
112+ 6. Install the latest Magisk
98113
99114` ` ` sh
100- . \r ootAVD.bat system-images \a ndroid-34 \g oogle_apis_playstore \x 86_64 \r amdisk.img
115+ adb install Magisk.v2x.x.apk
101116` ` `
102117
103- ### Install Magisk Module
118+ 7. Select " /sdcard/Download/fakeboot.img" from Select and Patch a File in Magisk Install to create the patch.
119+
120+ 8. re-run ADV corresponding to API
121+
122+ ` ` ` sh
123+ .\r ootAVD.bat system-images\a ndroid-34\g oogle_apis_playstore\x 86_64\r amdisk.img FAKEBOOTIMG
124+
125+ 9. Enable " Zygisk" and " Enforce DenyList" .
126+
127+ 10. Reboot the system.
104128
129+ # ## Install Magisk Module
130+
131+ ` ` `
1051321. Install Magisk Module.
106133
107134- https://github.com/NVISOsecurity/MagiskTrustUserCerts/releases
0 commit comments