Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:12,190 --> 00:00:17,080
So we are now on the Android Bridge tutorial, so of course, it is a highly versatile command line
2
00:00:17,080 --> 00:00:18,910
to the LSU communicative device.
3
00:00:18,910 --> 00:00:22,360
So it could be any Android device running on different kind of manufacturers.
4
00:00:23,110 --> 00:00:27,340
And of course, there's a lot of actions and options for you to do and commands and features.
5
00:00:27,720 --> 00:00:33,130
You can run directly from your computer terminal all the way, injecting instructions into the mobile
6
00:00:33,130 --> 00:00:33,700
device.
7
00:00:34,090 --> 00:00:37,770
So, of course, there are three key components a client, a demon and a server.
8
00:00:37,780 --> 00:00:40,700
So we will go through the tutorial of all three of this.
9
00:00:41,260 --> 00:00:47,260
So make sure that your Android device is already connected into your computer using a USB line.
10
00:00:47,740 --> 00:00:52,900
So once you're in, we can actually go into terminal and all you got to do is enter EDB to make sure
11
00:00:52,900 --> 00:00:54,160
that you have 80 be installed.
12
00:00:54,730 --> 00:01:00,520
So in this case, once I hit EDB, I'll be able to see that I actually have all the commands, all the
13
00:01:01,090 --> 00:01:02,170
molecules installed.
14
00:01:02,200 --> 00:01:06,930
So when you hit EDB, it will show up to help each so you can see all the commands of it.
15
00:01:06,970 --> 00:01:09,790
So we will go through extensively on quite a number of them.
16
00:01:10,210 --> 00:01:14,250
That's really useful and helpful in terms of managing Android devices at the same time.
17
00:01:14,260 --> 00:01:18,880
Also, if you are a programmer or a developer and you want to look at what are some of the libraries
18
00:01:18,880 --> 00:01:23,750
already available on Android by default, you want to use some of the features inside the phone.
19
00:01:24,130 --> 00:01:28,720
This could really help you in accelerating the pace of understanding what's going on in the Android
20
00:01:28,720 --> 00:01:32,560
device and what you can do to actually manage those Android devices.
21
00:01:33,220 --> 00:01:38,990
So moving forward, of course, the couple of really interesting things that we will look at is on EDB.
22
00:01:39,100 --> 00:01:45,830
So once you hit EDB, enter 80 devices and this would actually show all the devices attach to your computer.
23
00:01:45,850 --> 00:01:48,280
So in this case, I got one device attached.
24
00:01:48,700 --> 00:01:54,070
And of course, once you have the device attached, you can actually go ahead and issue commands into
25
00:01:54,070 --> 00:01:56,470
the Android device once it is connected.
26
00:01:57,010 --> 00:02:04,150
So one of the commands that we can actually use is to actually look at what are some of the information
27
00:02:04,150 --> 00:02:06,690
on a shell that we want to put into the system.
28
00:02:06,700 --> 00:02:11,320
So when we enter ATV Shell, this would actually bring us into the Android device.
29
00:02:11,650 --> 00:02:17,650
And when we enter, say, Shell, we can see that we can see all the directories subdirectories inside
30
00:02:18,070 --> 00:02:19,480
the existing working directory.
31
00:02:19,480 --> 00:02:20,770
So we enter PWI.
32
00:02:21,280 --> 00:02:27,090
So as I have mentioned in many tutorials, Android device is like a Linux Fabián, all the distribution.
33
00:02:27,400 --> 00:02:29,560
A lot of the commands actually come out of box swivet.
34
00:02:29,860 --> 00:02:36,700
So let's say we enter into CDG Corot, we can enter SSL so we can see all the information here, all
35
00:02:36,700 --> 00:02:37,650
the subdirectories.
36
00:02:38,050 --> 00:02:44,110
So even on the left side, you could see that this is an indication of directory, the right access
37
00:02:44,110 --> 00:02:51,010
and the ability for you to look at owner, group and others in terms of the permissions to execute,
38
00:02:51,010 --> 00:02:53,960
to read and to write into those subdirectories and false.
39
00:02:54,280 --> 00:02:55,510
So this is really helpful.
40
00:02:55,510 --> 00:02:59,580
And if you want to see all the lists of commands said, you can actually use it.
41
00:02:59,590 --> 00:03:05,010
You can enter EDB, followed by Shell else on system again.
42
00:03:05,890 --> 00:03:10,730
So this will list out all the comments that you can actually issue inside your Android device.
43
00:03:10,750 --> 00:03:12,040
So this is really helpful.
44
00:03:12,310 --> 00:03:16,510
And in future, Tutorial will actually look at how we could start up services so we could actually kind
45
00:03:16,510 --> 00:03:21,040
of convert your Android device into a server and a server could run multiple services.
46
00:03:21,400 --> 00:03:26,810
And if you see some of the commands that we can see here directly, we will be able to see a lot of
47
00:03:26,980 --> 00:03:28,120
key capabilities.
48
00:03:28,120 --> 00:03:33,690
And one really important window would be using a lot in future tutorials would actually be on that cat.
49
00:03:34,060 --> 00:03:36,800
So on that cat is available over here, as you can see.
50
00:03:36,910 --> 00:03:42,220
So in that cat is going to be one of those commands they'll be using to build up services to interact
51
00:03:42,220 --> 00:03:46,940
separately from the Android device debugger or Android debug breach.
52
00:03:47,320 --> 00:03:51,580
And over here, it is a lot of other capabilities that you can look at in terms of managing the Android
53
00:03:51,580 --> 00:03:52,060
device.
54
00:03:52,900 --> 00:03:53,870
So moving forward.
55
00:03:53,890 --> 00:03:57,610
We also want to think about how else we can actually manage the Android device.
56
00:03:57,620 --> 00:04:04,000
So there is a activity manager to so activity manager can actually help us see what are some of the
57
00:04:04,000 --> 00:04:07,750
information running inside the system and we can monitor and so on.
58
00:04:07,780 --> 00:04:14,770
So all you've got to do is actually enter EDB, Shell Ádám and follow by all the other commands that
59
00:04:14,770 --> 00:04:15,700
you can see from here.
60
00:04:16,060 --> 00:04:20,520
So here we can actually see what are the items that you can key in Siyam.
61
00:04:20,530 --> 00:04:27,040
So it is a activity monitor so we can look at Profile Dume Hip and so on, profile start and all these
62
00:04:27,040 --> 00:04:32,890
other capabilities to actually help us manage some of these services or activities inside the Android
63
00:04:32,890 --> 00:04:33,400
device.
64
00:04:33,820 --> 00:04:39,160
So of course, moving forward, we will also be looking at RPM, which is a package manager.
65
00:04:39,160 --> 00:04:46,360
So I go do enter EDB, Shell p.m. and of course you can enter Lisse packages and when you enter these
66
00:04:46,370 --> 00:04:50,140
packages, it will list all the packages currently inside the Android device.
67
00:04:50,590 --> 00:04:57,210
So of course we got some song, we got the Google, we got a lot of other information, we got captive
68
00:04:57,220 --> 00:04:58,800
portal login and so on.
69
00:04:59,260 --> 00:05:00,460
So all these are the packages.
70
00:05:00,460 --> 00:05:01,540
They're already available.
71
00:05:01,540 --> 00:05:03,880
Incyte, your Android mobile device.
72
00:05:04,120 --> 00:05:06,340
And of course, we can also look at permissions.
73
00:05:06,340 --> 00:05:07,420
We can list features.
74
00:05:07,420 --> 00:05:11,530
So instead of listing packages, we can enter list features to see what are some of.
75
00:05:11,630 --> 00:05:17,150
Features is available inside your Android device, and when you're coding a mobile application, you
76
00:05:17,150 --> 00:05:23,690
can actually see or use like fingerprint motion recognition and so on as part of your mobile application
77
00:05:23,690 --> 00:05:24,300
development.
78
00:05:24,590 --> 00:05:29,390
So, you know, the majority of Android devices would have such features available and you can call
79
00:05:29,400 --> 00:05:33,180
them out in your mobile application, like likewise for libraries.
80
00:05:33,200 --> 00:05:37,760
So when the list libraries, we can actually see what are the libraries available that we can actually
81
00:05:37,760 --> 00:05:40,590
leverage on as you build your mobile application.
82
00:05:40,610 --> 00:05:45,910
So over here we can see like keast or camera and so on and rotation.
83
00:05:46,160 --> 00:05:51,350
So all these are actually really important, helping you find out more about how you can manage many
84
00:05:51,350 --> 00:05:55,020
of this libraries and, of course, moving forward.
85
00:05:55,070 --> 00:05:57,610
We can also look at the device policy manager.
86
00:05:57,980 --> 00:06:00,980
So when we enter EDB Shell, followed by BPM.
87
00:06:00,990 --> 00:06:03,100
So this is the device policy manager.
88
00:06:03,530 --> 00:06:05,370
And of course there are specific policies.
89
00:06:05,370 --> 00:06:09,660
So I'm not going to change any of the policies inside my current current mobile device.
90
00:06:09,680 --> 00:06:14,700
So here we can see we can set the active Etman device owner, profile owner and so on.
91
00:06:15,020 --> 00:06:19,520
So again, do try them out or if you want to look at security locks for security locks and you'll be
92
00:06:19,520 --> 00:06:23,150
able to retrieve all the security locks directly inside a mobile device.
93
00:06:23,840 --> 00:06:29,150
And of course, that's also a key capability in terms of thinking a screen cap.
94
00:06:29,150 --> 00:06:34,910
So all you gotta do is after Shell EDB shell screen cap and we can say we want to put the screen cap
95
00:06:35,690 --> 00:06:41,480
inside SD card so we can put SD card and we can call a screen cap.
96
00:06:43,220 --> 00:06:47,870
So I want you to do this deal with take a screenshot of the screen currently and we can actually do
97
00:06:47,870 --> 00:06:56,540
a pull off the fall so we can enter pull SD card, screen cap PMG.
98
00:06:56,660 --> 00:07:01,070
So once you hit that Adibi pool, this would actually download a file directly into your desktop or
99
00:07:01,070 --> 00:07:02,180
your current working directory.
100
00:07:02,660 --> 00:07:04,630
So here we can see that the file is empty.
101
00:07:05,000 --> 00:07:08,280
So which means that it is actually a blang, it's a lock screen.
102
00:07:08,300 --> 00:07:10,100
So what I can do is that can I do it again?
103
00:07:10,370 --> 00:07:11,840
But this time I'll lock the phone.
104
00:07:12,200 --> 00:07:15,290
And once I unlock the phone, all I got to do is issue to come down again.
105
00:07:15,680 --> 00:07:18,650
And once I got a command, I can actually do a pool game.
106
00:07:18,920 --> 00:07:21,890
And of course, here we can actually do a pool.
107
00:07:22,160 --> 00:07:25,400
And of course, this time round I can do a pool and we can update a file again.
108
00:07:25,410 --> 00:07:29,510
And in this case, once I open it up, I can see that we got a screen capture directly.
109
00:07:30,230 --> 00:07:33,260
So this is some of the ways that you can actually manage the Android device.
110
00:07:33,620 --> 00:07:37,340
And this is it for a basic tutorial on Android Duboc Breech.
111
00:07:37,340 --> 00:07:39,500
So I'll do like Surance.
112
00:07:39,500 --> 00:07:43,880
Subscribe to the channel so that you can be kept abreast of all the upcoming exciting videos that we
113
00:07:43,880 --> 00:07:44,960
have running for you.
12541
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.