I can have
tcpdump binary installed, but my (android) OS is not rooted.
So if I try to run it on termux:
$tcpdump -ni any tcp and port 12345 tcpdump: wlan0: SIOCETHTOOL(ETHTOOL_GLINK) ioctl failed: Permission denied
The binary owner was root and was located in
/data/data/com.termux/files/usr/bin/tcpdump so I decided the root privilege won't be necessary after I
mv it to my home directory. After which the owner is me, and the mod of the binary is:
-rwxrwxr-x 1 u0_a236 everybody 836K Feb 8 13:24 tcpdump
but even with the ownership, the same permission error.
So is there a way to bypass permission on not-rooted devices?
$uname -a Linux localhost 4.9.112-perf+ #1 SMP PREEMPT Tue Nov 17 00:51:35 WIB 2020 aarch64 Android device name: Redmi device model: Redmi 7 MIUI version: MIUI Global 11.0.11 Stable Android version: 9 PKQ1.181021.001
EDIT: bypassing does not mean "exploiting". This is not security question. I may be used wrong term, but the intention here is to use
tcpdump for diagnostic purposes (see comments). The whole story is that the device is not rooted. The device that I bought, that I own. So even being the owner, I am not able to access the full filesystem (e.g. ->
cd /data -> permission denied). So how can a owner (not "hacker"), use binary that requires root privileges? or list root directory? or anything where root privileges are required?