SMTShell icon indicating copy to clipboard operation
SMTShell copied to clipboard

[Question] how to reverse the exploit?

Open Bakr-Ali opened this issue 1 year ago • 1 comments

First of all, I'm a noob with some experience in linux & adb commands & Shizuku, and stumbled upon this project and thought (from its description) that it is essentially like getting root access without actually rooting the device and tripping the knox hardware thing.

So I tried it and followed the in-app instructions to downgrade whatever SMT is (I have no idea) and grant Shizuku permission. I tried the local shell (ls -a command) but got permission denied. So, I uninstalled the app as I didn't want to do anything further since I don't have knowledge about it and its risks.

Now, how do I reverse the downgrade of SMT so that my device is less vulnerable? And is that the only thing that I should reverse or did the app do other things that should be reversed too?

Bakr-Ali avatar Oct 07 '24 17:10 Bakr-Ali

just reboot, that re-upgrades the downgraded app

ZXMushroom63 avatar Jul 20 '25 17:07 ZXMushroom63