当前位置:网站首页>Adb authorization process analysis
Adb authorization process analysis
2022-08-05 07:59:00 【Xiaoyuanzi 2016】
adbkey and adbkey.pub
adbkey and adbkey.pub_caibaihui's blog - CSDN blog _what is adbkey file
Experiments have shown that the public key on the mobile phone and the private key on the computer can be successfully paired, even if I modify the public key on the computer later, it will not affect the previous authorization
For example, the mobile phone has a built-in public key, and the paired private key is generated on my computer to complete the authorization

adb pull /data/misc/adb/adb_keys . The public key is stored in it
The authorization pop-up window shows that the RSA key fingerprint should be based on the public key. I don't know how to calculate it.

adb keygen cc can be used to generate RSA public and private keys
This information box will typically display the fingerprint (MD5) of the host's public key, not the host's
public key itself
ADB public key and private key authentication mechanism Use the following command to generate the host public key fingerprint: $ awk "{print $1}" < adbkey.pub | openssl base64 -A -d -a | openssl md5 -c | awk "{print $2}" | tr "[:lower:]" "[:upper:]" Actually, I used this command to find that the generated pop-up window is different from the one I saw, I am ready to give up and find new articles In general, it is necessary to process base64 and md5 separately For this, I need to know that the actual key in the file is the base64 encoded part, i.e. long cryptic string of characters.In my case the key field was always followed by the user-host field, i.e. something like In the latter case, I need to filter on the second field.In Windows, apparently, this is done using a Extract the key in the second field of 
23:B2:47:E1:08:DE:5A:3B:58:5A:A5:A6:FA:98:E0:50[email protected] (also [email protected]), in some strings the case is preceded by a field containing ssh-rsa.for loop.I also send the output to a file for certUtil to do subsequent digestion, the output of which goes into the file again - containing the key which is no longer base64 encoded but in bytes - and finally hashed with MD5.id_rsa.pub into a file named tmp.key_base64:
边栏推荐
猜你喜欢

爬虫从入门到入牢

MongoDB 语法大全

Redis implements distributed lock-principle-detailed explanation of the problem

每月稳定干2万

TRACE32——Break

Ethernet Principle

Re regular expressions

Redis实现分布式锁-原理-问题详解

3555. 二叉树

In the anaconda Promat interface, import torch is passed, and the error is reported in the jupyter notebook (only provide ideas and understanding!)
随机推荐
链表专项之环形链表
"Automatic Data Collection Based on R Language"--Chapter 3 XML and JSON
[转帖]嫁人一定要嫁工资至少比你高3571.4元的男士
【深度学习实践(一)】安装TensorFlow
uniapp time component encapsulates year-month-day-hour-minute-second
2022.8.2 模拟赛
每一个女孩曾经都是一个没有泪的天使
Discourse 清理存储空间的方法
nn.unfold和nn.fold
在ASP控制数字及字母输入
存储过程编写经验和优化措施
Re regular expressions
基于 Docker 快速使用远程(云)数据库
[Structural Internal Power Cultivation] The Mystery of Enumeration and Union (3)
DeFi 前景展望:概览主流 DeFi 协议二季度进展
SQL SERVER关于主从表触发器设计
强网杯2022 pwn 赛题解析——house_of_cat
【 LeetCode 】 235. A binary search tree in recent common ancestor
Access Denied: "microsoft.web.ui.webcontrols" workaround
[Untitled] Long-term recruitment of hardware engineers-Shenzhen Baoan