Spoofing an android device
Android stores its build related properties in a secret file inside it.That file is crucial and should not be tampered with without any knowledge about it.
So that's what i am gonna tell you.
A bird's eye view about that file
- It has information about the heap size the phone has per app.
- Phone's screen density(helps google play to pick the apps that can run on your phone).Ever wondered why temple run doesn't show up in the playstore for a phone with lower screen density.
- Boot animation. The android animation that plays on when you boot your device.
- Wifi scan interval .Increasing the interval can help save you battery.
A tool to help you
Download an application to help you edit this file.
Here's a link to the application
So now here's how you start to spoof your emulator into some real device model
Note: Tampering with these properties may cause some problems so better try it on emulator.
Here are few properties that will spoof it easily,don't forget to REBOOT after the changes are done.
description
fingerprint
build.type
build.tags
build.user
characteristics(tablet or phone)
board
brand
device
manufacturer
model
name
host
Result: Changing the above properties made me register my emulator as a samsung device on google.
Other configuration changes include
lcd_Density - may allow google play to show some more apps to you
heap_size - may give more space to apps
wpa_supplicant_scan_interval (in seconds) - saves battery when increased.
Comments
Post a Comment