Anybody have aurora store apk and any other apks needed for it?
How does it work? Works without play services?
It will violate the terms of this forum to post it.
All you need is one apk (which you can find online). You donât need play services.
on the phones u have used, you cant even with mtkckient you will brick your phone
If you changed something in system -then not.
Except if you sign the ROM and reimplement avb via vbmeta.
But if you didnât change anything in system, you can relock with fastboot.
the command?
fastboot flashing lock
I am looking at the partitions of a device via mtk client. I donât see the vb partition. Does this make sense? Is it possible it has a different name?
According to ChatGPT, you don't need a Flipper Zero to test what wireless technology the 24six Gold is using, there are many other ways:
Below is a collection of both hardware and software techniquesâmost under $100âthat you can use to passively or actively sniff the Solo Gold or its Connect Station and definitively identify the underlying wireless protocol (Wi-Fi, Bluetooth, proprietary RF, etc.).
Summary:
- Hardware sniffers like RTL-SDR (~$30), Ubertooth One (~$100), Nordic nRF Sniffer (~$10), BLEShark Nano (~$50), and HackRF One ($150â$300) cover everything from standard 802.11 to Bluetooth LE and very custom 2.4 GHz links (rtl-sdr.com, webasha.com, academy.nordicsemi.com, kismetwireless.net).
- Software tools on PC or AndroidâWireshark with Bluetooth capture support, PCAPdroid for IP-level traffic, Network Analyzer for SSID scans, and Kismet for multi-protocol sniffingâlet you detect beacons, hidden SSIDs, BLE advertisements, or odd RF bursts (wiki.wireshark.org, github.com, techet.net).
- A step-by-step approach (SSID scan â BLE scan â full RF spectrum sweep â packet decode) will reveal whether Solo Gold is secretly using Wi-Fi, BLE, or a true proprietary link.
1. Hardware-Based RF Sniffers
1.1 RTL-SDR USB Dongle (~$25â$35)
A repurposed DVB-T tuner that, with software like GQRX or GNU Radio, can sweep 2.4 GHz for any beacon or burst when the device syncs (rtl-sdr.com, rtl-sdr.com). Use
rtl_power
to log power vs. frequency over time and spot the Connect Stationâs signature.1.2 Ubertooth One (~$90â$100)
An open-source 2.4 GHz receiver dedicated to Bluetooth Classic & LE, integrates seamlessly with Wireshark or Kismet for live BLE advertisement dumps (webasha.com, wifihax.com).
1.3 Nordic nRF Sniffer (~$10)
A low-cost USB dongle (based on the nRF52) that captures BLE âadvertisingâ and connection packets one channel at a time via Nordicâs nRF Connect Desktop (academy.nordicsemi.com, academy.nordicsemi.com).
1.4 BLEShark Nano (~$50)
A pocket-sized BLE sniffer that plugs into USB-C and streams BLE traffic into Wireshark, useful if you suspect BLE rather than Wi-Fi (rtl-sdr.com).
1.5 HackRF One (+ Portapack) ($150â$300)
A full-duplex SDR covering 1 MHzâ6 GHzâoverkill but capable of capturing any custom RF protocol, including obscure 2.4 GHz laser-tag style links (github.com).
2. Software & Smartphone-Based Sniffers
2.1 Wireshark with Bluetooth Capture
On Linux, enable BlueZ HCI monitoring (kernel â„ 2.4.6) and capture BLE packets directly in Wireshark to see real-time advertisements from the Connect Station (wiki.wireshark.org, wiki.wireshark.org).
2.2 PCAPdroid (Android)
An open-source app that logs all IP-level traffic (Wi-Fi or cellular) by simulating a local VPNâgood to verify if any IP connections occur during sync (github.com, github.com).
2.3 Network Analyzer (Android/iOS)
Scans and lists all visible SSIDs and channels in real-timeâideal for spotting hidden or default-named Wi-Fi APs near a Connect Station (techet.net).
2.4 Kismet
A multi-protocol sniffer/wardriver that, with a monitor-mode Wi-Fi adapter and Ubertooth attached, can log 802.11, BLE, Zigbee, and raw RF into one unified capture (kismetwireless.net, kismetwireless.net).
3. Step-by-Step Investigation Plan
SSID Scan:
- Launch Network Analyzer or run
iwlist scan
on Linux to list all SSIDs within range of the Connect Station (techet.net).- Look for hidden or proprietary SSIDs that appear only when you approach with Solo Gold.
BLE Advertisement Check:
- Plug in Ubertooth One or Nordic nRF Sniffer.
- Use Wireshark or nRF Connect Desktop to monitor BLE advertising channelsâyouâll see any custom BLE beacons if thatâs the method (webasha.com, academy.nordicsemi.com).
Broad RF Sweep:
- With an RTL-SDR dongle, run
rtl_power -f 2.400G:2.483G:1M
as you trigger a sync to capture spikes at specific frequencies (rtl-sdr.com, rtl-sdr.com).Deep Packet Analysis:
- Load captures into Wireshark.
- Filter for beacon frames (for Wi-Fi), BLE ADV packets, or custom protocols (check for unknown OUI/vendor IDs).
Advanced Validation (Optional):
- If you suspect a proprietary RF, use HackRF One to record raw I/Q and then decode via GNU Radio or Universal Radio Hacker.
4. Additional Tips
- Rooted Phone + Extcaps: On Android, use
adb
+ Androiddump extcap plugin to pipe HCI traffic into Wiresharkâno extra hardware needed for BLE (wiki.wireshark.org).- Time-Synced Logging: Ensure your PC/phone clock is synced to avoid confusing logs when switching between methods.
- Environment Control: Test in a low-noise environment (e.g., late night) to minimize interference from Wi-Fi routers or BLE beacons.
By combining these low-cost tools and a structured approach, youâll conclusively determine whether Solo Goldâs âConnectâ is truly a custom RF link or simply a locked-down Wi-Fi/Bluetooth channel.
@ekjr should have one. Read this
If youâre phone has a IR blaster (like the qin) you can try this.
sorry, I dont have one but i want one
Yup, we all doâŠ
Is it just me, or does the main Jtech website not work?
same here
@DonBot
.
I have a new WebApp (apk) that needs testing for kashrus.
PM me if youâre interested in helping.
What?
Whats
?