Content deleted Content added
Decrease logo size |
m remove redundant param |
||
Line 1:
{{Short description|Tool for debugging Android-based devices}}▼
{{distinguish|Advanced Debugger}}
{{good article}}
▲{{Short description|Tool for debugging Android-based devices}}
{{Infobox software
| title = Android Debug Bridge
Line 44:
| website = {{URL|https://developer.android.com/studio/command-line/adb}}
| AsOf =
}}
The '''Android Debug Bridge''' (commonly abbreviated as '''adb''') is a [[programming tool]] used for the [[debugging]] of [[Android (operating system)|Android]]-based devices. The [[Daemon (computing)|daemon]] on the Android device connects with the server on the host PC over [[USB]] or [[Transmission Control Protocol|TCP]], which connects to the client that is used by the end-user over TCP. Made available as [[open-source software]] under the [[Apache License]] by [[Google]] since 2007, features include a shell and the possibility to make backups. The adb software is compatible with [[Microsoft Windows|Windows]], [[Linux]] and [[macOS]]. It has been misused by [[
== Features ==
[[File:Android Device Monitor.png|thumb|left|Android Device Monitor
Features of adb include copying files from the host computer,<ref>{{Cite book|last=Darcey|first=Lauren|url=https://www.worldcat.org/oclc/749852462|title=Android wireless application development|date=2012|publisher=Addison-Wesley|others=Shane Conder|isbn=978-0-321-81383-1|edition=3rd|___location=Upper Saddle River, NJ|oclc=749852462|access-date=2021-09-26|archive-date=2021-09-26|archive-url=https://web.archive.org/web/20210926122121/https://www.worldcat.org/title/android-wireless-application-development/oclc/749852462|url-status=live}}</ref> installing apps, viewing logcat output, getting a [[Unix shell]],
Some [[Graphical user interface|graphical interfaces]] have been made available. The graphical Android Device Monitor in [[Android Studio]] can be used for retrieving information from an Android device.<ref>{{Cite book|last1=Morgillo|first1=Ivan|last2=Viola|first2=Stefano|url=https://www.google.co.in/books/edition/Learning_Embedded_Android_N_Programming/bOrUDQAAQBAJ?hl=en|title=Learning embedded Android N programming: create the perfectly customized system by unleashing the power of Android OS on your embedded device|date=2016|___location=Birmingham, UK|page=89|isbn=9781785283284|oclc=1020708322|access-date=2021-09-26|archive-date=2021-09-26|archive-url=https://web.archive.org/web/20210926122010/https://www.worldcat.org/title/learning-embedded-android-n-programming-create-the-perfectly-customized-system-by-unleashing-the-power-of-android-os-on-your-embedded-device/oclc/957278992|url-status=live}}</ref>
Line 70 ⟶ 69:
|After the device is connected to the host computer, the user needs to verify the RSA key fingerprint of the host computer
}}
=== Host computer ===
For Windows, the Android SDK contains the adb.exe binary that can be extracted and installed.<ref>{{Cite book|last=Harwani|first=B. M.|url=https://www.worldcat.org/oclc/862745697|title=PhoneGap build: developing cross platform mobile applications in the cloud|date=2013|isbn=978-1-4665-8975-9|___location=Boca Raton|pages=38|oclc=862745697|access-date=2022-01-29|archive-date=2022-03-07|archive-url=https://web.archive.org/web/20220307163655/https://www.worldcat.org/title/phonegap-build-developing-cross-platform-mobile-applications-in-the-cloud/oclc/862745697|url-status=live}}</ref> How-To Geek recommends adding the folder containing the binaries to the [[PATH (variable)|PATH]] environment variable.<ref>{{Cite web|last1=Hoffman|first1=Chris|last2=Fedewa|first2=Joe|date=4 September 2021|title=How to Install and Use ADB, the Android Debug Bridge Utility|url=https://www.howtogeek.com/125769/how-to-install-and-use-abd-the-android-debug-bridge-utility/|url-status=live|access-date=2021-09-09|website=How-To Geek|language=en-US|archive-date=2021-09-18|archive-url=https://web.archive.org/web/20210918232917/https://www.howtogeek.com/125769/how-to-install-and-use-abd-the-android-debug-bridge-utility/}}</ref>
Line 97:
== Security ==
Up to [[Android 2.2]], Android was vulnerable to the ''RageAgainstTheCage'' [[Exploit (computer security)|exploit]]. The adb [[Daemon (computing)|daemon]] did not check for the return value of the [[setuid]] [[system call]] when [[dropping privileges]]. The exploit [[Fork (system call)|forks]] processes until it fails due to the exhaustion of [[
Various families of malware such as ADB.Miner, Ares, IPStorm, Fbot and Trinity have scanned the internet for public availability of the adb interface and installed malware on those devices.<ref>{{Cite web|last=Cimpanu|first=Catalin|title=Android devices ensnared in DDoS botnet|url=https://www.zdnet.com/article/android-devices-ensnared-in-ddos-botnet/|url-status=live|access-date=2021-09-10|website=[[ZDNet]]|language=en|archive-date=2021-09-10|archive-url=https://web.archive.org/web/20210910135518/https://www.zdnet.com/article/android-devices-ensnared-in-ddos-botnet/}}</ref> adb can also be used to remove [[malware]], by booting into [[safe mode]] and running the <code>adb uninstall</code> command.<ref>{{Cite news|last=Schuman|first=Evan|title=This Vultur app takes malicious to the next level|language=en|work=[[Computerworld]]|url=https://www.computerworld.com/article/3627326/this-vultur-app-takes-malicious-to-the-next-level.html|access-date=2021-09-10|archive-date=2021-09-10|archive-url=https://web.archive.org/web/20210910135522/https://www.computerworld.com/article/3627326/this-vultur-app-takes-malicious-to-the-next-level.html|url-status=live}}</ref>
|