{% extends "base.html" %} {% block title %}AUTARCH — RCS/SMS Exploit{% endblock %} {% block content %}
Extract, forge, modify, backup, and exploit SMS/RCS messages on connected Android devices. Uses content providers (no root), Archon relay, CVE-2024-0044, and bugle_db direct access.
Scan all known messaging content providers to see which are accessible at UID 2000.
Extract the Google Messages RCS database. The database is encrypted at rest — raw file extraction also requires the encryption key. Best method: Archon relay (queries from decrypted app context). Fallback: CVE-2024-0044 (app-UID access) → root (DB + keys) → ADB backup.
Run arbitrary SQL against a previously extracted bugle_db.
Import from SMS Backup & Restore XML format.
Newline injection in PackageInstallerService allows run-as access to any app's private data. Works on Android 12-13 with security patch before October 2024.
Back up all SMS/MMS/RCS messages from the device. Content providers capture SMS/MMS; Archon relay or bugle_db extraction captures RCS.
Monitor incoming SMS/RCS messages in real-time via logcat interception.