Help for rooting - HTC Flyer, EVO View 4G

Hello,
I've not posted on here for a bit.
Basically I'm wanting to put my HTC Flyer WiFi back to Gingerbread as Honeycomb is no where near as stable.
Not used the Flyer for a while because of this.
I have thought about this for a while and looked at rooting the Flyer but everytime I look into it and find instructions I have more questions and seem to hit a brick wall at various stages.
As I am a complete noob and never rooted a device, can anyone help in a basic way.
Is the HTC dev root a good place to start?
Thanks, any help appreciated.
Sent from my HTC Sensation XE with Beats Audio Z715e using xda premium

/banned

Banned?
Sent from my HTC Sensation XE with Beats Audio Z715e using xda premium

Wrong section. Development if for developers to post their work (ROMs, mods, etc.). Development is not for posting of questions, or seeking basic help.
Post in Q&A.

JB1971 said:
As I am a complete noob and never rooted a device, can anyone help in a basic way.
Is the HTC dev root a good place to start?
Thanks, any help appreciated.
Sent from my HTC Sensation XE with Beats Audio Z715e using xda premium
Click to expand...
Click to collapse
Because I just root it recently, I can help you:-
Required downloads
1.First download the Gingerbread RUU.
2.If you don't have adb and fastboot on your PC
◦Get fastboot and adb tool for windows
3.Download universal misc_version and unzip to obtain the misc_version file.
4.Download tacoroot
5.Place both the misc_version and tacoroot.bin files in the same directory as adb
Procedure
1.Check the version number for your gingerbread RUU
RUU_Flyer_hTC_Asia_WWE_2.27.707.1_Radio_20.3504.30.089BU_3809.07.04.06_M_release_204905_signed
3.The version is 2.27.707.1
4.Boot your flyer up to android if it's not already on, with usb debugging enabled and connect it to the PC.
5.Run the following adb commands (in DOS prompt after install adb tools)
6.Code:
adb push tacoroot.bin /data/local/
adb push misc_version /data/local/
adb shell chmod 755 /data/local/tacoroot.bin
adb shell chmod 755 /data/local/misc_version
adb shell /data/local/tacoroot.bin --setup
7.At this point your device will reboot to recovery
8.Simultaneously press Volume Down and Power
9.Reboot your device
10.Run the following command
11.Code:
adb shell /data/local/tacoroot.bin --root
12.Your device will reboot, do not worry if it does not boot fully, it doesn't matter for this procedure, and it is a side effect of this root exploit.
13.Run the following command:
14.Code:
adb shell /data/local/misc_version -s 2.27.707.1
15.Note that the number in RED is the version number retrieved in step 1.
16.Reboot to fastboot:
17.Code:
adb reboot bootloader
Relock the bootloader:
18.Code:
fastboot oem lock
19.Go back to fastboot mode ( lock causes the device to reboot )
20.Run your RUU ( if on linux or mac, see other similar threads from me on how to RUU on those OSes )
This is what happened in the command prompt:-
What is happened in real case:-
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
D:\>cd download
D:\Download>cd flyer
D:\Download\Flyer>cd fastboot
D:\Download\Flyer\fastboot>adb push tacoroot.bin /data/local/
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
614 KB/s (14475 bytes in 0.023s)
D:\Download\Flyer\fastboot>adb push misc_version /data/local/
2489 KB/s (367096 bytes in 0.144s)
D:\Download\Flyer\fastboot>adb shell chmod 755 /data/local/tacoroot.bin
D:\Download\Flyer\fastboot>adb shell chmod 755 /data/local/misc_version
D:\Download\Flyer\fastboot>adb shell /data/local/tacoroot.bin --setup
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by
both Justin Case and Dan Rosenberg (Rosenberg fist). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into recovery, please press Volume+, Volume- and Power at the same tim
e, and reboot the system.
D:\Download\Flyer\fastboot>adb shell /data/local/tacoroot.bin --root
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by
both Justin Case and Dan Rosenberg (Rosenberg fist). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into root.
D:\Download\Flyer\fastboot>adb shell /data/local/misc_version -s 2.27.707.1
--set_version set. VERSION will be changed to: 2.27.707.1
Patching and backing up misc partition...
D:\Download\Flyer\fastboot>adb shell /data/local/misc_version -s 2.27.707.1
--set_version set. VERSION will be changed to: 2.27.707.1
Patching and backing up misc partition...
D:\Download\Flyer\fastboot>adb reboot bootloader
error: device not found
D:\Download\Flyer\fastboot>adb reboot bootloader
error: device not found
D:\Download\Flyer\fastboot>adb reboot bootloader
error: device not found
D:\Download\Flyer\fastboot>adb reboot bootloader
error: device not found
D:\Download\Flyer\fastboot>fastboot oem lock
... INFODevice was already locked!
OKAY [ 0.004s]
finished. total time: 0.005s
D:\Download\Flyer\fastboot>
Click to expand...
Click to collapse
Click to expand...
Click to collapse
Then I just run the RUU

Related

Rooting.. frustration.

So I have mac osx and windows. I've tried rooting on both. I can follow a tutorial, that is how I've rooted my thunderbolt when it first came out. But my new thunderbolt won't root using the methods that are working for others. So I request someone to help me out as to writing a step by step setup for required prerequisites programs... Thank you. Something isnt working. I just want to enjoy perks of root again.
Sent from my ADR6400L using XDA App
Which instructions are you trying to follow, JCase's or Cap's? Also, where is the root procedure failing for you? I only ask because there is no one here who could write better step by step instructions than the ones already included in both rooting methods.
Have to agree. Any information at all regarding how its failing would be most helpful.
Okay. For windows I used the script that is a batch file because I've heard it is super easy to use... When I first was running the script it would not find the device. Now it will find it with debugging on. But when debugging is on my device won't be listed in my computer. With debugging off it will show up on my computer. Anyways with the script it says it pushes all the files then when my phone is to reboot it won't.
Sent from my ADR6400L using XDA App
Make sure that your ADB is set up properly before you start using the batch file.
A great set of instructions can be found here:
http://www.droidforums.net/forum/droid-hacks/10924-how-adb-windows-made-easy.html
The batch file is also old and some of the files included in it might be too dated to use. Try using JCase's method.
Last login: Fri Jul 29 16:53:34 on ttys000
scott-roccas-macbook:~ scott87$ cd ..
scott-roccas-macbook:Users scott87$ cd ..
scott-roccas-macbook:/ scott87$ cd and*
scott-roccas-macbook:androidsdk scott87$ cd tools
scott-roccas-macbook:tools scott87$ ./adb devices
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
List of devices attached
HT14RS010885 device
scott-roccas-macbook:tools scott87$ ./adb push busybox /data/local/
1867 KB/s (1062992 bytes in 0.555s)
scott-roccas-macbook:tools scott87$ ./adb push psneuter /data/local/
1764 KB/s (585731 bytes in 0.324s)
scott-roccas-macbook:tools scott87$ ./adb push misc.img /data/local/
1943 KB/s (262144 bytes in 0.131s)
scott-roccas-macbook:tools scott87$ ./adb shell chmod 777 /data/local/busybox
scott-roccas-macbook:tools scott87$ ./adb shell chmod 777 /data/local/psneuter
scott-roccas-macbook:tools scott87$ ./adb shell /data/local/psneuter
mmap() failed. Operation not permitted
scott-roccas-macbook:tools scott87$
following this tutorial for my mac... http://forums.androidcentral.com/th...9-mac-procedure-how-root-htc-thunderbolt.html I have rooted my orignal TB over 6 times. Now I cannot use the same method on my new TB. Wtf. It wont let me go past the step of ./adb shell /data/local/psneuter
what is wrong?
Where did you get the exploits file that contained the psneuter file and such? Try downloading the files from http://www.multiupload.com/K4BZ22SIT5 and verify the md5 is 3b359efd76aac456ba7fb0d6972de3af and try again.
I'm kinda clueless without firmware versions and what exploits exactly are being used.
My exploits folder matches the MD5 checksum... I am on the newest possible firm. Someone please help me solve this issue...
http://forum.xda-developers.com/showthread.php?p=12785644#post12785644
http://forums.androidcentral.com/thunderbolt-rooting-roms-hacks/73211-rooting-issues.html#post782824
Both of those links showed ppl having similar problems. Try their fixes of restoring to factory defaults and trying again or re-formatting your card.
Thank you for your help. Doing a factory reset made the difference. I greatly appreciate it.
Dueces.
Sent from my ADR6400L using XDA App
Check out these videos, they helped me go through all the steps. The second time I rooted this thing was harder because I thought I had everything setup, and I did but I had to redo everything to get it to work. Start fresh by doing the drivers again, then put the contents of the exploits zip in sdk tool, (all the files but one were correct on mine, I think it was just an outdated version and that was one of my hold ups)
http://www.youtube.com/watch?v=oKPSe12YDxQ
http://www.youtube.com/watch?v=mc6EMdPpF6o
This is why you should manually root, and not do the auto crap... problems

[HOW-TO][zergRush Root] Root w/ v2.2.x-2.3.x (NOT ICS 4.x or GB after 11/2011)

This thread is a collaboration by myself, paxChristos, DooMLorD, & amishxda. Please give credit where credit is due. Thanks.
This method has been confirmed to work on all models of the Xperia PLAY - R800x / R800i / R800a / R800at. Also works perfectly with the Xperia Arc.
WARNING: This doesn't work, however, on the Verizon Wireless R800x v2.3.2. Please update to v2.3.3 before rooting. - confirmed by paxChristos
WARNING #2: Confirmed that this doesn't work with 4.0.2.A.0.62
MAJOR WARNING - ICS (4.x) doesn't work with it & any update to GB (2.3.x) after November 2011 won't either.
paxChristos said:
The exploit used in this toolkit was patched back in November of 2011. No more updates will come from the exploit devs.
Click to expand...
Click to collapse
Thanks to everyone who tested this out for me & confirmed that it worked!
NOTE: Before you attempt to root your phone, please ensure that you have the Android SDK installed. It has the adb binary within it.
Android SDK
http://developer.android.com/sdk/index.html
All needed files have been attached for this process to work correctly.
Note: I didn't create zergRush. I only found the method to implement permanent root after zergRush has done its job.
Automatic Root
1) SuperOneClick
SuperOneClick now has the zergRush method built-in.
Please see the source thread if you have any questions.
Downloads available @ http://shortfuse.org/
Source: http://forum.xda-developers.com/showthread.php?t=803682a
2a) DooMLoRD's Easy Rooting Toolkit [v4] (zergRush Exploit)
This is the one click method that everyone has been asking for & DooMLoRD has answered with this.
DooMLoRD said:
UPDATE: added v4, with newest zergRush binary (21 Nov 2011) and few corrections/additions to script
UPDATE: most companies are patching the exploit in the latest firmwares (Samsung, Motorola, Sony Ericsson, etc)
UPDATE: added v3, with newest zergRush binary (16 Nov 2011) and newer superuser files
UPDATE: added v2, with newest zergRush binary (10 Nov 2011) and newer superuser files
[ support the developers ]
There have now been nearly 440,000 downloads of this easy rooting toolkit for various devices (see list here), and many more if you include variations/different translations, etc that use it.
Don't be a leech, buy me a coffee/beer/etc (and use the "Thanks" button!). Imagine if every user of this tool had donated me even $1...
if you want to support Revolutionary Team (creators of the Exploit which makes this possible ) you can donate to Revolutionary Team's PayPal Donation Link
[ Info ]
(WINDOWS ONLY)
WILL WORK ON BOTH LOCKED & UNLOCKED BOOTLOADER DEVICES!
just download the attached file, extract it using winzip/winrar
go to the folder where its extracted and execute "RUNME.bat"
read and follow the instructions on the screen!
Code:
---------------------------------------------------------------
Easy rooting toolkit (v4.0)
created by DooMLoRD
using exploit zergRush (Revolutionary Team)
Credits go to all those involved in making this possible!
---------------------------------------------------------------
[*] This script will:
(1) root ur device using latest zergRush exploit (21 Nov)
(2) install Busybox (1.18.4)
(3) install SU files (binary: 3.0.3 and apk: 3.0.6)
[*] Before u begin:
(1) make sure u have installed adb drivers for ur device
(2) enable "USB DEBUGGING"
from (Menu\Settings\Applications\Development)
(3) enable "UNKNOWN SOURCES"
from (Menu\Settings\Applications)
(4) [OPTIONAL] increase screen timeout to 10 minutes
(5) connect USB cable to PHONE and then connect to PC
(6) skip "PC Companion Software" prompt on device
[ Tested on ]
Tested & Reported to be working on the THESE devices
[ Credits ]
Credits go to all those involved in making this possible!
zergRush Binary from: Revolutionary - zergRush local root
Inspired from: http://forum.xda-developers.com/showthread.php?t=1312859
[ Donations ]
if u feel that this work has helped u OR u think that the work i put into making this is worthy of donations, then click on the following link for buying me some coffee/beer/etc My PayPal Donation Link
if you want to support Revolutionary Team (creators of the Exploit which makes this possible ) you can donate to Revolutionary Team's PayPal Donation Link
[ Download Links ]
DooMLoRD_v4_ROOT-zergRush-busybox-su.zip <NEW>
DooMLoRD_v3_ROOT-zergRush-busybox-su.zip
DooMLoRD_v2_ROOT-zergRush-busybox-su.zip
DooMLoRD_v1_ROOT-zergRush-busybox-su.zip
[ UnRooting ]
want to unroot? read this
[ Scripts posted by others ]
Rooting script for Linux
Rooting script for MAC OSX
Toolkit for GT-I9000
For Atrix 2
For VIZIO vTab1008
regards,
DooMLoRD
Click to expand...
Click to collapse
Source: http://forum.xda-developers.com/showthread.php?t=1319653
My deepest thanks to DooMLoRD for automating & simplifying this process!
2b) amishxda's modified Linux script (based on paxChristos' script // Source: DooMLoRD's Easy Rooting Toolkit)
amishxda said:
Update: Updated as per DooMLoRD's v4.0 script with zergRush binary of 21 Nov 2011 and with makespace which deletes Google Maps if there is not enough space.(< 6MB)
Hello
I am completely new to Android but not at all new to Linux.
I used paxchristos script (ran commands manually though) to root my Sony Ericsson Live with Walkman. (WT19i / Android 2.3.4 / Build 4.0.2.A.0.58)
Source threads used:
http://forum.xda-developers.com/showthread.php?t=1319653
http://forum.xda-developers.com/showthread.php?p=18615502
In an attached file, I fixed/modified/added few things in paxchristos script. Here is the detail:
1) Fixed error in symlinking su. (source/destination were same)
2) Don't delete (and recreate) /data/local/tmp/ directory unnecessarily, just delete its contents
3) Uses dd instead of cp (because DooMLoRD's script does, dont know why!). Update: as per anantshri, dd is used because cp has been known to give errors.
4) If your system already has 'adb' then it uses system 'adb' instead of one in zip-archive.
5) Updated zip archive to contain the latest files from DooMLoRD's archive (paxchristos archive seemed old)
Please try/verify and let me know if I missed something.
Thanks.
Click to expand...
Click to collapse
zergRush_automated_Linux_root.zip
Source: http://forum.xda-developers.com/showthread.php?p=20869699
Original script by paxChristos: http://forum.xda-developers.com/showthread.php?p=18615502#post18615502
Manual Root
3) Noob Friendly Guide
paxChristos has provided me with a very comprehensive guide regarding this process for anyone that absolutely wants a step-by-step layout.
It has been attached to this thread within a 7-zip file. If you would like the faster route, please follow my own instructions.
Download PDF Guide
4) Advanced Android Users (& those that are aiming to be) Guide
Download all required files. Drivers have been provided courtesy of paxChristos for anyone that needs them.
Do the following within a cmd (as administrator) or terminal prompt (through sudo or root user)
Code:
adb shell mkdir /data/local/tmp
adb push zergRush /data/local/tmp
adb chmod 755 /data/local/tmp/zergRush
adb shell
cd /data/local/tmp/
./zergRush
adb remount
adb push su /system/bin
adb push su /system/xbin
chmod 4755 /system/bin/su
chmod 4755 /system/xbin/su
exit
adb install Superuser.apk
Alternate: adb push Superuser.apk /system/app
installed BusyBox (if it doesn't show up on the system already) via any busybox installer market app
Ran SuperUser & verified settings
Code:
adb reboot
Android should be completely rooted!
Automatic Unroot
DooMLoRD's Unrooting Script
DooMLoRD said:
UNROOTING SCRIPT v1.0
so here is the unrooting script to be USED ONLY AND ONLY IF U HAVE USED MY FILES (Easy Rooting Toolkit) FOR ROOTING
[ WARNING ]
if u have used any other way/solution for rooting then PLEASE DO NOT RUN THIS... you MIGHT END UP with damaged system...
(thats cause some ppl create symlinks for busybox in /system/bin/ which wipes out stock symlinks to /system/bin/toolbox and breaks/damages system)
[ DISCLAIMER ]
I AM NOT TO BE HELD RESPONSIBLE IF U DAMAGE UR PHONE / SPILL UR COFFEE / MISS UR ALARMS / ANY OTHER CALAMITY/MISHAP
REMEMBER YOU ARE DOING THIS AT YOUR OWN RISK
now that the warning is clear (hopefully) lets get to unrooting
Tested on:
Sony Xperia ARC
so here is the file.. (WINDOWS ONLY)
just download the attached file, extract it using winzip/winrar
go to the folder where its extracted and execute "RUNME-UNROOT.bat"
read and follow the instructions on the screen!
Code:
---------------------------------------------------------------
Easy rooting toolkit (v1.0)
UNROOTING SCRIPT
created by DooMLoRD
based heavily on FlashTool scripts (by Bin4ry and Androxyde)
Credits go to all those involved in making this possible!
---------------------------------------------------------------
[*] This script will:
(1) unroot ur device using special script
(2) remove Busybox and assocaited symlinks
(3) remove SU files and assocaiated data
[*] Before u begin:
(1) make sure u have installed adb drivers for ur device
(2) enable "USB DEBUGGING"
from (Menu\Settings\Applications\Development)
(3) enable "UNKNOWN SOURCES"
from (Menu\Settings\Applications)
(4) [OPTIONAL] increase screen timeout to 10 minutes
(5) connect USB cable to PHONE and then connect to PC
(6) skip "PC Companion Software" prompt on device
---------------------------------------------------------------
if all goes well u will get output LIKE THIS
regards,
DooMLoRD
DooMLoRD_v1_UNROOTING.zip
Click to expand...
Click to collapse
Sources/Acks/Links/Attachments
Sources:
http://forum.xda-developers.com/showthread.php?t=1312082
http://forum.xda-developers.com/showthread.php?t=1296916
http://androidsu.com/superuser/
Acknowledgments:
Ch4lky - Sony Ericsson Xperia fix for zergRush (Revolutionary Team)
ieftm - zergRush (Revolutionary Team)
Revolutionary Team - many thanks to everyone who worked on zergRush
paxChristos - provided debug info to Ch4lky & created the Noob PDF guide
ChainsDD - Superuser & su
DooMLoRD - for the awesome rooting & unrooting scripts
CLShortFuse - SuperOneClick
Cl8rs - identified possibility for Xperia PLAY to use zergRush
XenonMD - confirmed that this works on the R800i
barlw - confirmed that this works on the R800a
Luniticus - confirmed that this works on the R800at
AndroHero - recommended the alternate method for pushing the Superuser.apk to /system/app for working around stability issues
amishxda - for updating paxChristos' script to work on more phones from Linux
Everyone else - who have confirmed that it works on many other phones
Please let me know any new information to smooth out the process. I'll modify this post to ensure it's a smooth one.
zergRush (no longer attaching due to new updates from the devs) - supports a large amount of phones
https://github.com/downloads/revolutionary/zergRush/zergRush.zip
Superuser v3.0.7 apk
http://goo-inside.me/superuser/Superuser-3.0.7-efgh-signed.zip
su v3.0.3.2 binary
http://goo-inside.me/superuser/su-bin-3.0.3.2-efghi-signed.zip
Thanks!!!
Edit: Please PM me if you were a part of discovery, research or one of the tools listed.
Thanks I wasn't trying to be stuck up or anything, just wanted credit.
Awesome...I've been watching the Zerg thread with bated breath and I didn't have to wait long.
i just wish I had my damn usb cable with me right now.
Big thanks to all involved, I will be trying this asap.
Is there a way to un-root? Just curious...
Step-by-literal-step
If you feel like seeing the step by step PDF Guide, go to these : attached to post #1, or:
At dropbox.com: http://db.tt/RaAUnzjW
At Ubuntu one: http://ubuntuone.com/64OujxgkGMv1N2QSoPmXin
or at Filesonic: http://www.filesonic.com/file/2730341354
If you're doing the script rooting in linux, do these things first
1) Download and unzip file (it's below at dropbox.com or ubuntu one; or it's posted in #1 as an attachment)
2) open up terminal
3) type "su"
4) enter your password
4a) if you don't have su set up
4b) type "passwd"
4c) enter you username password (no, there will be no ***s to show that you entered anything, just hit enter when you've inputted your password)
4d) input a password for root (unix) (no, there will be no ***s to show that you entered anything, just hit enter when you've inputted your password)
4e) type "su" and enter your password
5) navigate to location you unzipped the file to (chrome default download is /home/[your username]/Downloads)
6) type "chmod 755 runme-linux"
7) type "cd files"
8) type "chmod 755 adb"
9) type "cd .."
10) type "./runme-linux"
11) type "exit" x2 to exit terminal
12) enjoy your rooted play!
Here's the script (and all applicable files) (totally ripped off DooMLoRD's code, thank him, please, for me), go to these links:
At dropbox.com: http://db.tt/a4H6QFfV
At Ubuntu one: http://ubuntuone.com/7mD63kpsKzGmaou5hcftBV
Here's the linux script code
Code:
#!/bin/bash
#This is DooMLoRD's script for windows. I've ported it to linux
#Somethings to remember
#1) Chmod this file!! ("chmod 777 runme-linux")
#2) Run this script as su in terminal (if you haven't set up your su password run the command "passwd" in terminal, it'll ask you for your username password, and then you'll type in a root password. NOTE: You will not see any changes (i.e. *** representing typed letters) but the password is still being inputted.
#I skipped all of DooMLoRD's info because I'm using VIM and don't feel like rewritting it
echo "--Starting---"
echo "---Killing the adb server to make sure that there are no problems---"
./files/adb kill-server
echo "---Waiting for Device---"
./files/adb wait-for-device
echo "---Cleaning out any previous zergRush attempts---"
./files/adb shell rm -r /data/local/tmp
echo "---Creating temp folder for zergRush---"
./files/adb shell mkdir /data/local/tmp
echo "---Pushing zergRush---"
./files/adb push ./files/zergRush /data/local/tmp/
echo "---Fixing permissions for zergRush---"
./files/adb shell chmod 755 /data/local/tmp/zergRush
echo "---Running zergRush---"
./files/adb shell /data/local/tmp/zergRush
#If it gets stuck here for a long time then try:
#1)disconnect usb cable and reconnect it
#2)toggle "Usb Debugging" (first disable it then reenable it")
echo "---Device found!---"
./files/adb wait-for-device
echo "---Pushing busybox---"
./files/adb push ./files/busybox /data/local/tmp
echo "---Fixing busybox permissions---"
./files/adb shell chmod 755 /data/local/tmp/busybox
echo "---remounting system---"
./files/adb shell /data/local/tmp/busybox mount -o remount,rw /system
echo "---copying busybox to /system/xbin---"
./files/adb push files/busybox /system/xbin
echo "---fixing ownership and permissions---"
./files/adb shell chown root.shell /system/xbin/busybox
./files/adb shell chmod 04755 /system/xbin/busybox
echo "---installing busybox---"
./files/adb shell /system/xbin/busybox --install -s /system/xbin
echo "---cleaning up---"
./files/adb shell rm -r /data/local/tmp/busybox
echo "---pushing SU binary---"
./files/adb push ./files/su /system/bin/su
echo "---correcting ownership and permissions for SU---"
./files/adb shell chown root.shell /system/bin/su
./files/adb shell chmod 06755 /system/bin/su
echo "---correcting symlinks---"
./files/adb shell rm /system/xbin/su
./files/adb shell ln -s /system/bin/su /system/xbin/su
echo "---Pushing Superuser app---"
./files/adb push ./files/Superuser.apk /system/app/
echo "--cleaning---"
./files/adb shell rm -r /data/local/tmp
echo "---rebooting---"
./files/adb reboot
echo "---All done, your Xperia Play has been rooted by DooMLoRD---"
echo "---This script has been ported by paxchristos!!---"
echo "---If have any questions, feel free to email me @ [email protected]"
[Removed walkthrough because it's in the PDF guide. And the PDF guide has pictures. Pretty, pretty pictures of unicorns. Or command line. You decide.]
Thank you to: cl8rs for stumbling up zergRush,
Ch4lky, ieftm, and the Revolutionary team for making (and updating zergRush)
CrimsonSentinal13 for getting us from adb root to phone rooted!
DooMLoRD for doing the script in windows, and giving me something to work off of!
Have fun people, and enjoy!!
Note: With the stock kernal, we cannot overclock, but you can underclock your cpu
Note2: Drivers were added to the first post (Crimsonsentinal13) for sake of keeping everything simpler added drivers for Xperia Play -- to get them to work (if you don't already have them installed, goto device manager, find the SEMC driver (it might show up as android device or unknown device) then update driver, and point it to this zip (unzipped, of course)
Note3: Android SDK Download link: http://developer.android.com/sdk/index.html
Note4: Unrooting?? Who would want to unroot?? One way I unrooted (using my wife's Casio Commando was to uninstall superuser.apk, and the busybox installer (i know, i didn't get rid of everything) but at that point, unless the Verizon/Phone Company employee is a genius, they won't know whether or not you're rooted
Note5: OTA Updates. We don't know what'll happen. If one comes, DENY until we can figure out what'll happen... Most likely, it'll just lose root (hopefully temporarily, we won't know until we get there) but if it bricks all the rooted Plays, I don't want an angry mob with pitchforks at my or Crimsonsentinals13's doorstep
Note6: Updated guide!! Hopefully I fixed all the errors that were in there before (thank you to all the users that pointed them out to me) and added a few things.
Note6B: Somebody had a problem with a busybox installer not downloading from the android market. attached a free one off android market that I used. I only have guesses why this happened (pm setInstallLocation 2...?) but here one is so you have that option as well...
Note6C:I also attached insecure adb. Insecure ADB is COMPLETELY OPTIONAL and should only be downloaded and installed AFTER YOU HAVE ROOT if you want to use root in adb after you reboot. Again COMPLETELY OPTIONAL and you won't necessarily need it.
Note7: As jeffkhlam found out, at no point do you need fastboot. This doesn't unlock the bootloader (no custom roms.)
Note8: If you're having issues doing this, I'll be hopping on and off the thread between 8:00am until about 11:00pm Central Standard Time. If it's not between those hours, please wait, we'll get around to helping you!
Will it work with a locked bootloader
doua27 said:
Will it work with a locked bootloader
Click to expand...
Click to collapse
Yep. My Xperia PLAY is brand new & I got it to work w/o unlocking the bootloader.
I think you forgot the Windows driver you mentioned....
sorry, i was doing it all in linux, and i forgot them they're updating in 5 seconds...
I keep getting "Cannot copy boomsh, : Permission denied" at step 16 Help?
CrimsonSentinel13 said:
All needed files have been attached.
Download all required files.
Do the following within a cmd or terminal prompt
Code:
adb shell mkdir /data/local/tmp
adb push zergRush /data/local/tmp
adb chmod 755 /data/local/tmp/zergRush
adb shell
cd /data/local/tmp/
./zergRush
adb remount
adb push su /system/bin
adb push su /system/xbin
chmod 4755 /system/bin/su
chmod 4755 /system/xbin/su
exit
adb install Superuser.apk
installed BusyBox (if it doesn't show up on the system already) via any busybox installer market app
Ran SuperUser & verified settings
Code:
adb reboot
Android should be completely rooted!
Sources:
http://forum.xda-developers.com/showthread.php?t=1312082
http://forum.xda-developers.com/showthread.php?t=1296916
http://androidsu.com/superuser/
Acknowledgments: Ch4lky, ieftm, paxChristos, ChainsDD, Cl8rs
Please let me know any new information to smooth out the process. I'll modify this post to ensure it's a smooth one.
Click to expand...
Click to collapse
So if i do this and root the device but still locked bootloader does that mean that i cant install cyanogenmod?
But can used root applications?
garner said:
So if i do this and root the device but still locked bootloader does that mean that i cant install cyanogenmod?
But can used root applications?
Click to expand...
Click to collapse
Yes that's correct it's only for root apps etc. You need to unlock your bootloader for flashing custom roms and kernels. So no CyanogenMod without unlocking your BL.
Regards Dousan...
Is this is also the correct steps for r800i's ?
I'm on 2.3.3 with my r800i , i won't lose anything using this method, with a locked bootloader, just want/need root access lol
Cl8rs said:
I keep getting "Cannot copy boomsh, : Permission denied" at step 16 Help?
Click to expand...
Click to collapse
Same thing here....
CoconutWillie said:
Same thing here....
Click to expand...
Click to collapse
I think he forgot a 'cd' in step 16:
cd /data/local/tmp/zergRush 'enter'
Regards Dousan...
Alright, so after numerous tries i finally got my phone rooted. Big thanks for all the instructions.
Cl8rs said:
I keep getting "Cannot copy boomsh, : Permission denied" at step 16 Help?
Click to expand...
Click to collapse
Make sure that /data/local/tmp has permissions to give you full access.
tekken179 said:
Is this is also the correct steps for r800i's ?
I'm on 2.3.3 with my r800i , i won't lose anything using this method, with a locked bootloader, just want/need root access lol
Click to expand...
Click to collapse
I don't know how it works with the R800i. Please try it & let us know how it works.
Dousan said:
I think he forgot a 'cd' in step 16:
cd /data/local/tmp/zergRush 'enter'
Regards Dousan...
Click to expand...
Click to collapse
zergRush isn't a directory, it's a binary. Using the cd command won't work on it.
See the guide I posted, now has info to get past annoying stutters
Anybody stuck at step 16, input the following commands
1) cd /data/local/tmp
2) rm boomsh
3) rm sh
4) continue on with rooting!
Sent from my R800x using XDA App

[Q] Read partitions without rooting

I'm trying to find an universal way to read userdata partition(dump partition) without rooting the device.
Assumption :
the device can be boot in fastboot mode
Possible ways :
1. Using fastboot
I've looked into fastboot.c, it taking usb as a usb_handle pointer. I'm trying to move from that point. Fastboot is mostly to write or erase, but I assumed if writing and erasing are possible, reading should be possible as well.
2. Using nvflash, tftp...
It won't be the solution, since it's chip dependent but using chip vendor's download tool to dump partitions.
Go for it!
How does using adb dumping from /dev/mmcblk0p1 sounds?
can I unmount mmcblk0p1, and mount back to readable position?
what device? more info please.
dd if=dev/mmcblk0p? of=data.img bs= 8096 is usually the easiest. (<--just an example)
also this may be helpful:
http://forum.xda-developers.com/showthread.php?t=1247908
chrisrotolo said:
what device? more info please.
dd if=dev/mmcblk0p? of=data.img bs= 8096 is usually the easiest. (<--just an example)
also this may be helpful:
http://forum.xda-developers.com/showthread.php?t=1247908
Click to expand...
Click to collapse
Thanks for the link. using dd command is the exact way I used to dump mmc block as root. Or can it be run under not-rooted phones?
Rooting depends on the kernel version of devices, so when I have to dump various phones, it's very cumbersome to root different kinds of devices and dump.
So I'm finding a way to walk around the problem by using fastboot or if possible adb.
I think fastboot is my best bet so far.
How about adb?
adb shell
df -h
kkiqq1208 said:
How about adb?
adb shell
df -h
Click to expand...
Click to collapse
df -h will only show usage of storage medias. Is there anyway I can read off the actual data?
As already mentioned, dd, but via ADB. I believe that it functions at a low enough level that you should be able to dump mmcblk0 without having to be rooted. If dd can't be directly accessed via adb, you could extract a busybox install from a rooted phone and set it up in your adb directory and then run it from there with busybox (in theory).
Волк said:
As already mentioned, dd, but via ADB. I believe that it functions at a low enough level that you should be able to dump mmcblk0 without having to be rooted. If dd can't be directly accessed via adb, you could extract a busybox install from a rooted phone and set it up in your adb directory and then run it from there with busybox (in theory).
Click to expand...
Click to collapse
Question.
Feels like i'm on the different page from you. If i run dd for /dev/mmcblk0 it does give me an error message saying "Access Denied" of couse mmcblk0 is owned by root. And busybox too(I haven;t tried this), it's just a set of linux commnads, I'm not sure how it can access a file(in this case, a device) which does not have its ownership.
Please correct me if I'm wrong.
Hi All,
There is a way to dump any partition to SD card partition on unrooted device vi ADB.
Paste this couple of lines into the terminal :
adb kill-server
adb wait-for-device
adb shell "echo ro.kernel.qemu=1 > /data/local.prop"
adb reboot
adb wait-for-device
adb shell "mount -wo remount rootfs /"
adb shell "rm /data/local.prop"
adb shell dd if=/dev/block/mmcblk0p1 of=/sdcard/mmcp1.dump
The phone may reboot many time after that, so make sure the file /data/local.prop is deleted after this operation. or execute this :
adb reboot
adb wait-for-device
adb shell "rm /data/local.prop"
adb reboot
hope that helps
__________________
HTC One X (SFR)
Wissam said:
Hi All,
There is a way to dump any partition to SD card partition on unrooted device vi ADB.
Paste this couple of lines into the terminal :
adb kill-server
adb wait-for-device
adb shell "echo ro.kernel.qemu=1 > /data/local.prop"
adb reboot
adb wait-for-device
adb shell "mount -wo remount rootfs /"
adb shell "rm /data/local.prop"
adb shell dd if=/dev/block/mmcblk0p1 of=/sdcard/mmcp1.dump
The phone may reboot many time after that, so make sure the file /data/local.prop is deleted after this operation. or execute this :
adb reboot
adb wait-for-device
adb shell "rm /data/local.prop"
adb reboot
hope that helps
__________________
HTC One X (SFR)
Click to expand...
Click to collapse
Has anyone verified if this works for reading partitions on a non-rooted phone?
This doesn't work on an unrooted, locked device.
Code:
C:\Windows\System32>adb shell "echo ro.kernel.qemu=1 > /data/local.prop"
/system/bin/sh: can't create /data/local.prop: Permission denied
This did not work for my phone.
I got "permission denied" right after
adb shell "echo ro.kernel.qemu=1 > /data/local.prop"
Most of the above will only work on a rooted device with superuser.
The loop holes for shadow copies are mostly fixed since 6.0.
Partitions that can be accessed without root can be dumped with DD through ADB if ADB itself is supported and not internally limited to prevent just this.
Try
Code:
adb reboot recovery
adb root
adb shell
In my device, I can able to read those /data /dev without bootloader unlocking or root.
HemanthJabalpuri said:
Try
Code:
adb reboot recovery
adb root
adb shell
In my device, I can able to read those /data /dev without bootloader unlocking or root.
Click to expand...
Click to collapse
So, ... You are lucky. If I try these commands, I am getting "error: closed". And believe it or not, I have my bootloader UNlocked. It's a doomed chinese tablet, Allwinner 100 SOC.
observingman said:
So, ... You are lucky. If I try these commands, I am getting "error: closed". And believe it or not, I have my bootloader UNlocked. It's a doomed chinese tablet, Allwinner 100 SOC.
Click to expand...
Click to collapse
I found that it is common for many Realme devices to able to use `adb root` in recovery mode.
I have a Realme C12 which has Mediatek Helio G35 MT6765G SoC. So we can also able to `readback` partitions by using SP Flash Tool with the help of MTK-bypass.

[Q] Root for Sharp Aquos SH-06D

Hi guys
I've imported the SH-06D from Japan and the phone is running great, however I'd like to remove some system apps etc to help speed up the phone (it's still on 2.3.5) and obviously tweak it as well.
I know there is an existing thread on the SH-01D (predecessor to the SH-06D) but I'm wondering if anyone has successfully rooted the SH-06D and if so, is there an (easy) process to do this?
Another reason I want to root, is to install the UI from the upcoming Evangelion Nerv edition of the SH-06D that is due to be released in a few days.
ICS for the SH-06D is just around the corner (due to be released in July) but I'd realy appreciate any help, assistance or tips in rooting the phone as it is now.
Cheers! :fingers-crossed:
Anyone?
:-(
here is a link to root the sh-06d :
http://itsuki.ddo.jp/gadget/index.php?SH-06D
THANK YOU!
Have you tried this method and does it work? Can you assist me in following those directions?
Cheers
interfreak said:
THANK YOU!
Have you tried this method and does it work? Can you assist me in following those directions?
Cheers
Click to expand...
Click to collapse
i haven't tried since i don't have this phone.
i can try to help you if you want.
testnumero said:
i haven't tried since i don't have this phone.
i can try to help you if you want.
Click to expand...
Click to collapse
Thanks mate!
I'm fumbling through the process now - it's a little hard when you are using google translate lol!
OK, I've run through all the steps but..
When I get to the end of the process:
C:\Users\interfreak\Desktop
$ su
su
su: permission denied
:-(
interfreak said:
OK, I've run through all the steps but..
When I get to the end of the process:
C:\Users\interfreak\Desktop
$ su
su
su: permission denied
:-(
Click to expand...
Click to collapse
i don't know what is the problem, try to do steps again.
Tried, same result. :-(
interfreak said:
Tried, same result. :-(
Click to expand...
Click to collapse
i'll ask to translate it
Thanks mate!!! :highfive:
I want to know untill now has SH-06D been rooted?
I wish someone could dump ROM or launcher from SH-06 NERV version:fingers-crossed:
I'm working on the translation for root on Sharp Aquos SH-06D.
Please give me one or two more days!
That is highly impossible, having full root in J Phone are hard enough. Unlocking the bootloader is a wet dream for almost everyone who likes J phone
lightout said:
I want to know untill now has SH-06D been rooted?
I wish someone could dump ROM or launcher from SH-06 NERV version:fingers-crossed:
Click to expand...
Click to collapse
I'm trying to hard reset my SH-06D, but I can't do it via settings-privacy. I can select to wipe, but nothing happens.
Any suggestions?
I got the Nerv edition
Hey man, how did the rooting go? I ordered the Nerv edition of this phone, and I want to root it (mainly to pair my sixaxis controller for psx emulation) but wanted to consult with you first as a precaution.
Here is the a rough translation of the root guide found here:
http://itsuki.ddo.jp/gadget/index.php?SH-06D
Big thanks to testnumero for the help!
Please don't ask me directly for help. I don't own this phone.
A quick look at root
• With root you can freeze preinstalled bloatware and backup application settings and game save data.
• 3D content from /system can be played on other devices and 3DTVs.
Unresponsive apps can be frozen which will help the device run smoother and have a longer battery life.
Applications which are frozen disappear from your drawer making the device look cleaner and keeping your mind at ease.
• The process is similar to the one used for SH-01D.
• If an update patch is released or the Android 4.0 summer update is released then this guide will no longer be of help.
(Make sure your device is the following: Android Ver. 2.3.5 Build No. 01.00.03)
• If your device becomes a paperweight I won’t be held responsible.
• Follow this guide at your own risk.
↑
Preparations – Before you begin
• Install Android SDK and SHARP ADB USB drivers and make to use ADB.
• 「Settings」→「Applications」→「Development」→「USB Debugging」 checked.
• SH-06D and micro USB cable to connect to your PC
↑
Required Files
• Download "shdisphook" from the following link and extract.
http://goo.gl/Bs6Iq
• Download shsdgetroot-omap4.zip from the following link and extract.
http://www1.axfc.net/uploader/File/so/78144
• Download shbootgetroot-su.lzh from the following link and extract.
http://www.mediafire.com/?6i0n32jlwbxe8cp
• Keep all extracted files in the same folder.
↑
Creating files
• Create a file named "shdisphook.bat" in the folder with the extracted files.
Copy and paste the following and save.
adb push onload.sh /data/local/
adb push libsdservice_jni.so /data/local/
adb push shdisphook /data/local/
adb shell chmod 755 /data/local/onload.sh
adb shell chmod 755 /data/local/shdisphook
adb reboot
adb wait-for-device shell /data/local/shdisphook
pause
• Create a file named "oncmd.sh" and put the following in the description.
(Save the line break as LF)
chmod 777 /cache
chmod 666 /cache/recovery
• Replace the contents of the file "installfile.cmd" with the following and save.
adb shell /data/local/shsdgetroot-omap4 -c "/system/bin/mount -o rw,remount -t rootfs rootfs /"
adb shell /data/local/shsdgetroot-omap4 -c "/system/bin/chmod 777 /sbin"
adb push su /sbin
adb push busybox /sbin
adb shell /data/local/shsdgetroot-omap4 -c "/system/bin/chown 0.0 /sbin/su"
adb shell /data/local/shsdgetroot-omap4 -c "/system/bin/chown 0.0 /sbin/busybox"
adb shell /data/local/shsdgetroot-omap4 -c "/system/bin/chmod 6755 /sbin/su"
adb shell /data/local/shsdgetroot-omap4 -c "/system/bin/chmod 755 /sbin/busybox"
adb shell /data/local/shsdgetroot-omap4 -c "/sbin/busybox --install -s /sbin"
adb shell /data/local/shsdgetroot-omap4 -c "/system/bin/chmod 755 /sbin"
adb shell /data/local/shsdgetroot-omap4 -c "/system/bin/mount -o ro,remount -t rootfs rootfs /"
adb push Superuser.apk /data/local/
adb shell /system/bin/pm install -t -f -r /data/local/Superuser.apk
adb shell /system/bin/rm /data/local/Superuser.apk
exit /b
↑
Step 1
• Open command prompt to the folder with the extracted files and navigate to "shdisphook".
Execute "shdisphook.bat". (You can also just double click on the .bat file)
• The device will reboot so just wait for the [Press any key to continue] message to appear.
If more than a few minutes have passed and nothing has appeared then, force close and execute "shdisphook.bat" again.
(When you fail your PC will reboot or your SH-06D WiFi will start. There is a high rate of success when you immediately unlock the lock screen for your device when it goes to sleep.)
↑
Step 2
• Open command prompt and send oncmd.sh to SH-06D to change permissions
adb push oncmd.sh /data/local/oncmd.sh
adb shell chmod 755 /data/local/oncmd.sh
• 「Settings」→「microSD and device storage」→「Unmount microSD」 This will execute the file "oncmd.sh" , which was sent to the device earlier.
(Cancel the message for 「Unmount microSD」)
• Enter the following commands.
adb shell mv /cache/recovery /cache/recovery_
adb shell ln -s /dev/shsd /cache/recovery
• Execute the following adb shell ls -l /cache and if you see the following message you have succeed.
drwxrwx--- root  root 2011-11-11 03:39 lost+found
drw-rw-rw- system cache 2012-01-24 10:48 recovery_
lrwxrwxrwx shell  shell 2012-03-02 13:24 recovery -> /dev/shsd
• Next execute adb shell ls -l /dev/shsd you should get the following message if you were successful.
crw-rw-rw- system cache 231, 0 2012-04-23 02:01 shsd
↑
Step 3
• Execute adb push shsdgetroot-omap4 /data/local
• Execute adb shell /system/bin/chmod 755 /data/local/shsdgetroot-omap4
• Execute adb shell /data/local/shsdgetroot-omap4 -v -m -u
• The “# “mark will appear there will be no response. Close command prompt for now.
• Execute installfile.cmd
• Check if you have root with the following adb shell→su
↑
After you reboot
• After you reboot you will lose root rights so execute shdisphook.bat→Cancel Unmount microSD →execute installfile.cmd and you should have root again.
The reason why you cannot do a clean wipe or nothing happen is because the recovery section has been move out into another location, causing it to not loading the recovery correctly.
Check with SH-01d part, I have asked similar question there and I revert the recovery in order to wipe the phone..
You need to rearrange the following section like on the sh-01d when you hit this part:
(Following is Original command that you relocated the recovery for root)
adb shell mv /cache/recovery /cache/recovery_
adb shell ln -s /dev/shsd /cache/recovery
And replace with the revert command found on sh-01d thread. You will need to redo all the steps from step 1 to step 2 and STOP AFTER YOU REVERT the RECOVERY.
You should be able to do a full wipe with no issue then. DO NOT POWER DOWN or RESET!!! You will have to REDO it again as it REQUIRES SHDSIHOOK to input shell command.
Hope it helps
waiting!!!!!!!!!!

[Q] Rooting china android phone

I Request senior members to help me on this topic coz m a begainer to android m trying to root my cell since last 1 month but always i get an disappointment with 0 result so i request mods and senior members to help me in rooting my phone..
my cell is a made in china cell so i dont have the drivers
here are some more details for ur refference
campany name Aimax
model: R5830i
ANDROID VERSION: 2.3.5
BASEBAND VERSION: BASE_W12.17/sc6820_sp6820/04-20-2012/16:03:42
kernel version:2.6.35.7 [email protected]#9
software version:mocorDroid2.3.5.w12.09.10
hardware version:1.1.0
and one more thing when i connection to pc it shows found new hardware "spreadtrum phone" but it is unable to update the drivers...
Positive replies are always appreciated thanx in advance
Plez help
plez help waiting for your reply...
Rooting China phones in windows and linux
Try one of these:
1. Using linux {Recommended}Install Ubuntu or DebianEither
Install the android-sdk.
dl.google●com/android/adt/adt-bundle-linux-x86-20130717.zip <==x86
dl.google●com/android/adt/adt-bundle-linux-x86_64-20130717.zip <==x86_64
or
Just get the standalone adb and fastboot executables
texasice-cream-sandwich-mirror.googlecode●com/files/adb_fastboot.zip​Install ia32-libsRun this in a terminal
Code:
sudo apt-get install libc6-i386 lib32stdc++6 lib32gcc1 lib32ncurses5
Now download the files required for root and put it in the same folder as adbmir●cr/GDEPZT4V​After you finish installing the files,
Connect your device with debugging mode enabled
Run
Code:
cd path/to/adb
where "path/to/adb" is the directory of your adb file
Now run
Code:
sudo chmod a+x adb
sudo chmod a+x fastboot
>>Root
Code:
./adb devices
./adb push busybox /data/local/tmp/
./adb push su /data/local/tmp
./adb push Superuser.apk /data/local/tmp
./adb shell
Chmod and run the exploit under adb shell
Code:
cd /data/local/tmp
chmod 755 psneuter
./psneuter
Now re-engage an adb shell to check if the exploit worked.
Code:
./adb kill-server
./adb devices
./adb shell
If you see a # sign, the exploit was was successful. Otherwise repeat from >>Root
Now run these on the same adb shell
Code:
cd /data/local/tmp
./busybox ash
mount -o remount,rw /system
mv /data/local/tmp/su /system/xbin/su
chmod 6755 /system/xbin/su
chown 0.0 /system/xbin/su
mv /data/local/tmp/Superuser.apk /system/app/Superuser.apk
chmod 777 /system/app/Superuser.apk
cp /data/local/tmp/busybox /system/xbin/busybox
chmod 6755 /system/xbin/busybox
Now reboot your device and open up SuperSU. Let it update the binary.
Your device should be rooted. ​2. Use Windows + MoboroboMethod 1 {Recommended but hard}
Download Moborobo from
Code:
moborobo●com
This software can Install drivers for many china phones and other branded phones.
After installing Moborobo download the files required for root
Code:
mir●cr/GDEPZT4V
Extract the files to the installation directory of Moborobo.
Code:
C:\Program Files (x86)\Moborobo
Run a CMD window under that directory and type
Code:
xcopy AndroidInterface.exe abd.exe
Connect your device in debugging mode & Open up Moborobo, It will install the drivers.
Keep Moborobo open & Follow the instructions mentioned in >>Root
P.S- the linux commands begin with a "./" remove this in windows or else it won't work. Note: Wherever I mentioned a terminal, the windows equivalent to this would be cmd​Method 2 {Easier}
Download and Install Moborobo just like above and run this under a cmd on that folder
Code:
xcopy AndroidInterface.exe
Also download UnlockRoot or SuperOneClick
To make sure the adb files are same, Copy over
Code:
adb.exe
AdbWinApi.dll
AdbWinUsbApi.dll
to UnlockRoot's tools directory or SOC's ADB directory
Connect your device in debugging mode and open up moborobo.
Now keep Moborobo open and Run UnlockRoot or SOC. ​Good Luck :good:
(c) Smo0thK, team BL4CKF1R3
Press thanks if I helped you.
Nice tutorial you have posted Smo0thK. Please also comment on the following points.
1) Which tablets have you tried the above methods to get root access. Since most of the tablets in Indian market are from China, same would be the situation in Bangladesh and similar techniques can be used. Please list their Brand and model numbers.
2) I personally use a Penta IS701c which actually is pre-rooted from factory but the su command does not work because configuration is messed up. (# prompt in ADB shell indicates root access) Many of these Chinese tablets come pre-rooted from factory but to get su command working things have to be cleaned up. What is your experience about this.
3) Android 3.1+ devices must support USB Host mode but most of the tablets are lacking support. (Use USB Host Diagnostics app to find out).
Have you found any tablet that supports USB Host mode without a custom kernel.
Best Regards,
Vineet Kumar

Categories

Resources