Kingo Root

Last updated
Kingo Root
Kingo Logo.png
Type of site
Tools
Available inEnglish, Russian, German, French, Spanish, Turkish, Italian, Serbian

KingoRoot is software intended to provide root access on smartphones, tablet computers, etc. running all versions of the Android operating system from 4.1.2, [1] available since 2013. [2] There is another very similar Android Application [3] with the same purpose, KingRoot [4] launched at about the same time; the two very similarly-named applications are often confused.

Contents

KingoRoot was used in an exploit by ZNIU along with the DirtyCow exploit in September 2017 to gain root access. [5] [6]

KingoRoot was banned from the XDA Developers forum along with vRoot in November 2013 due to concerns with the information collected by the app during the rooting process. [7]

Reviews

CNET gave Kingo Android Root 3.5 out of 5 stars, [8] and Rick Broida, a CNET editor, says the KingoRoot app "makes rooting a one-click affair", while noting that it does not work for all devices. [9]

Digital Trends said that using an app is "one of the easiest ways to root your Android device", and included KingoRoot in its list of most reliable rooting apps. [10]

A long thread on the respected xda-developers Web site concluded, with detailed information and links, that the similarly named app KingRoot should be considered adware and malware, although it is often successful in gaining root access. [11]

See also

Related Research Articles

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware.

Android is a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Android is developed by a consortium of developers known as the Open Handset Alliance, though its most widely used version is primarily developed by Google. It was unveiled in November 2007, with the first commercial Android device, the HTC Dream, being launched in September 2008.

iOS jailbreaking is the use of a privilege escalation exploit to remove software restrictions imposed by Apple on devices running iOS and iOS-based operating systems. It is typically done through a series of kernel patches. A jailbroken device typically permits root access within the operating system and provides the right to install software unavailable through the App Store. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the end-user license agreement and strongly cautions device owners not to try to achieve root access through the exploitation of vulnerabilities.

Rooting is the process by which users of Android devices can attain privileged control over various subsystems of the device, usually smartphones and tablets. Because Android is based on a modified version of the Linux kernel, rooting an Android device gives similar access to administrative (superuser) permissions as on Linux or any other Unix-like operating system such as FreeBSD or macOS.

<span class="mw-page-title-main">HTC Aria</span> Smartphone model

The HTC Aria is a smartphone manufactured by HTC Corporation that runs the Android operating system with HTC Sense.

<span class="mw-page-title-main">Motorola Flipout</span> Android-based smartphone

The Motorola Flipout is a phone made by Motorola and released in June 2010. Its touchscreen is 2.8 inches in size. It also has a 3.2-megapixel camera and comes in a wide variety of colors such as "Poppy Red", "Brilliant Blue″, "Licorice Black", "White", and "Saffron". However, in Australia, only "Poppy Red" and "Licorice Black" are available. The Flipout runs on Android 2.1. Its square-shaped body has two parts that rotate near the bottom-right corner to reveal a five-row QWERTY keyboard below the screen. It has an accelerometer and includes a web browser with Adobe Flash Lite 3.0. It also has a 720 MHz processor with a QVGA 320x240 pixel display.

<span class="mw-page-title-main">Android Debug Bridge</span> Tool for debugging Android-based devices

The Android Debug Bridge is a programming tool used for the debugging of Android-based devices. The daemon on the Android device connects with the server on the host PC over USB or TCP, which connects to the client that is used by the end-user over TCP. Made available as open-source software under the Apache License by Google since 2007, its features include a shell and the possibility to make backups. The adb software is available for Windows, Linux and macOS. It has been misused by botnets and other malware, for which mitigations were developed such as RSA authentication and device whitelisting.

<span class="mw-page-title-main">Google Play</span> Digital distribution service by Google

Google Play, also known as the Google Play Store or Play Store and formerly Android Market, is a digital distribution service operated and developed by Google. It serves as the official app store for certified devices running on the Android operating system and its derivatives, as well as ChromeOS, allowing users to browse and download applications developed with the Android software development kit and published through Google. Google Play has also served as a digital media store, offering games, music, books, movies, and television programs. Content that has been purchased on Google Play Movies & TV and Google Play Books can be accessed on a web browser and through the Android and iOS apps.

<span class="mw-page-title-main">F-Droid</span> Repository for free and open source Android apps

F-Droid is an open-source app store and software repository for Android, serving a similar function to the Google Play store. The main repository, hosted by the project, contains only free and open source apps. Applications can be browsed, downloaded and installed from the F-Droid website or client app without the need to register an account. "Anti-features" such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.

<span class="mw-page-title-main">Fire OS</span> Tablet operating system for Amazon devices

Fire OS is a mobile operating system based on the Android Open Source Project (AOSP). It is developed by Amazon for their devices. Fire OS includes proprietary software, a customized user interface primarily centered on content consumption, and heavy ties to content available from Amazon's storefronts and services.

<span class="mw-page-title-main">Wear OS</span> Smartwatch operating system by Google

Wear OS is a version of Google's Android operating system designed for smartwatches and other wearables. By pairing with mobile phones running Android version 6.0 "Marshmallow" or newer, or iOS version 10.0 or newer with limited support from Google's pairing application, Wear OS integrates Google Assistant technology and mobile notifications into a smartwatch form factor. Wear OS is closed-source, in contrast to the free and open-source Android.

Download Valley is a cluster of software companies in Israel, producing and delivering adware to be installed alongside downloads of other software. The primary purpose is to monetize shareware and downloads. These software items are commonly browser toolbars, adware, browser hijackers, spyware, and malware. Another group of products are download managers, possibly designed to induce or trick the user to install adware, when downloading a piece of desired software or mobile app from a certain source.

A potentially unwanted program (PUP) or potentially unwanted application (PUA) is software that a user may perceive as unwanted or unnecessary. It is used as a subjective tagging criterion by security and parental control products. Such software may use an implementation that can compromise privacy or weaken the computer's security. Companies often bundle a wanted program download with a wrapper application and may offer to install an unwanted application, and in some cases without providing a clear opt-out method. Antivirus companies define the software bundled as potentially unwanted programs which can include software that displays intrusive advertising (adware), or tracks the user's Internet usage to sell information to advertisers (spyware), injects its own advertising into web pages that a user looks at, or uses premium SMS services to rack up charges for the user. A growing number of open-source software projects have expressed dismay at third-party websites wrapping their downloads with unwanted bundles, without the project's knowledge or consent. Nearly every third-party free download site bundles their downloads with potentially unwanted software. The practice is widely considered unethical because it violates the security interests of users without their informed consent. Some unwanted software bundles install a root certificate on a user's device, which allows hackers to intercept private data such as banking details, without a browser giving security warnings. The United States Department of Homeland Security has advised removing an insecure root certificate, because they make computers vulnerable to serious cyberattacks. Software developers and security experts recommend that people always download the latest version from the official project website, or a trusted package manager or app store.

Tasker is an Android application originally developed by a developer known as "Pent", and later purchased by João Dias. It enables performing user-defined actions based on contexts in user-defined profiles, activated by click- or timer-based home screen widgets. It is expandable via AutoApps plugins from the developer and third-party apps. The app is available from Google Play; a 7-day free trial version which does not allow restoring backups can be downloaded as an APK on the app's website.

Shedun is a family of malware software targeting the Android operating system first identified in late 2015 by mobile security company Lookout, affecting roughly 20,000 popular Android applications. Lookout claimed the HummingBad malware was also a part of the Shedun family, however, these claims were refuted.

ES File Explorer is a file manager/explorer designed by ES Global, a subsidiary of DO Global, for Android devices. It includes features like cloud storage integration, file transfer from Android to Windows via FTP or LAN, and a root browser. It was removed from the Google Play Store for committing click fraud.

<span class="mw-page-title-main">Bootloader unlocking</span> Process of disabling secure device booting

Bootloader unlocking is the process of disabling the bootloader security that makes secure boot possible. It can make advanced customizations possible, such as installing a custom firmware. On smartphones this can be a custom Android distribution or another mobile operating system. Some bootloaders are not locked at all, others can be unlocked using a standard command, others need assistance from the manufacturer. Some do not include an unlocking method and can only be unlocked through a software exploit.

<span class="mw-page-title-main">SuperSU</span> Proprietary Android application, 2012–2018

SuperSU is a discontinued proprietary Android application that can keep track of the root permissions of apps, after the Android device has been rooted. SuperSU is generally installed through a custom recovery such as TWRP. SuperSU includes the option to undo the rooting. SuperSU cannot always reliably hide the rooting. The project includes a wrapper library written in Java called libsuperuser for different ways of calling the su binary.

References

  1. "KingoRoot for Android, the best One Click Root Tool/APK for free". KingoRoot. Retrieved 24 February 2020.
  2. "Root Android phone, flash custom ROM and manage your Android devices, Rooting Freeware Download". Kingo, archived on 24 September 2013. Archived from the original on 2013-09-24.
  3. gb, insta. "Android Application". gbinstaa. Retrieved 26 June 2023.
  4. "KingRoot APK v5.4.0 Download For Android". Appsrs. Retrieved 1 February 2022.
  5. "Dirty COW Now Being Abused on Android by ZNIU". xda-developers. 2017-09-27. Retrieved 2019-03-16.
  6. Osborne, Charlie. "Dirty Cow vulnerability discovered in Android malware campaign for the first time". ZDNet. Retrieved 2019-03-16.
  7. "KingoApp". XDA Developers. 29 October 2013. Retrieved 2019-03-17.
  8. "Review from CNET". 17 May 2024.
  9. Rick Broida (June 3, 2016). "How to easily root an Android device". CNET .
  10. "How to Root Your Android Phone". Digital Trends. 9 April 2021.
  11. "KingRoot Malware / Adware root !!". xda-developers. 2017. Retrieved 21 February 2020.