Spoofing an android device

Android stores its build related properties in a secret file inside it.That file is crucial and should not be tampered with without any knowledge about it.

So that's what i am gonna tell you.

A bird's eye view about that file

  • It has information about the heap size the phone has per app.
  • Phone's screen density(helps google play to pick the apps that can run on your phone).Ever wondered why temple run doesn't show up in the playstore for a phone with lower screen density.
  • Boot animation. The android animation that plays on when you boot your device.
  • Wifi scan interval .Increasing the interval can help save you battery.

A tool to help you

Download an application to help you edit this file.
Here's a link to the application

So now here's how you start to spoof your emulator into some real device model

Note: Tampering with these properties may cause some problems so better try it on emulator.

Here are few properties that will spoof it easily,don't forget to REBOOT after the changes are done.

description
fingerprint
build.type
build.tags
build.user
characteristics(tablet or phone)
board 
brand
device
manufacturer
model
name
host 

Result: Changing the above properties made me register my emulator as a samsung device on google.


Other configuration changes include 

lcd_Density - may allow google play to show some more apps to you
heap_size - may give more space to apps 
wpa_supplicant_scan_interval (in seconds) - saves battery when increased.




Comments

Popular posts from this blog

Digging deep inside the build

Another day of sheer gratefulness

Setting up continuous integration on linux