Skip to main content

Bypass Root Detection

Root detection is usually easy to bypass using one of the following tools. However, there may be cases where these tools do not work if the detection routine is more advanced. If you encounter this issue, please reach out for assistance!

Check for Root Detection

Install the app on to a rooted device and attempt to run it. If root detection is implemented, then the app will either display a pop-up box explaining that it cannot run or may just crash. If it doesn't continue to run, it likely has detection built into it.

The Objection framework should work to bypass most detections.

Bypass with Objection

Objection has built-in root detection bypasses. After connecting to the app, run the android root disable command:

objection -g 'App Name' explore
Using USB device `iPhone`
Agent injected and responds ok!

_ _ _ _
___| |_|_|___ ___| |_|_|___ ___
| . | . | | -_| _| _| | . | |
|___|___| |___|___|_| |_|___|_|_|
|___|(object)inject(ion) v1.9.6

Runtime Mobile Exploration
by: @leonjza from @sensepost

[tab] for command suggestions
com.company.appname on (pixel: 11.0) [usb] ## android root disable
(Job) Registering job 63ybpzbiuue. Started
com.company.appname on (pixel: 11.0) [usb] #

Once the job is running, check to see if the detections have been bypassed.