Rooting procedure updated
http://forum.xda-developers.com/ ... 61&postcount=18- F:\ADB>adb push rageagainstthecage-arm5.bin /data/local/tmp/rageagainstthecage
- 263 KB/s (5392 bytes in 0.020s)
- F:\ADB>adb shell chmod 700 /data/local/tmp/rageagainstthecage
- F:\ADB>adb shell
- $ cd /data/local/tmp
- cd /data/local/tmp
- $ ./rageagainstthecage
- ./rageagainstthecage[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C[*] checking NPROC limit ...
- [+] RLIMIT_NPROC={3084, 3084}[*] Searching for adb ...
- [+] Found adb as PID 64[*] Spawning children. Dont type anything and wait for reset![*][*] If you like what we are doing you can send us PayPal money to[*] 7-4-3-C[at]web.de so we can compensate time, effort and HW costs.[*] If you are a company and feel like you profit from our work,[*] we also accept donations > 1000 USD![*][*] adb connection will be reset. restart adb server on desktop and re-login.
- $
- F:\ADB>adb kill-server
- F:\ADB>adb start-server
- * daemon not running. starting it now *
- * daemon started successfully *
- F:\ADB>adb shell
- #mount -o remount,rw -t yaffs2 /dev/block/mtdblock3 /system
- Follow the following steps to install Superuser.apk, busybox,su
- F:\ADB>adb shell
- # cd /data/local/tmp
- cd /data/local/tmp
- # ./busybox cp busybox /system/bin
- ./busybox cp busybox /system/bin
- # chmod 4755 /system/bin/busybox
- chmod 4755 /system/bin/busybox
- # busybox cp Superuser.apk /system/app
- busybox cp Superuser.apk /system/app
- # busybox cp su /system/bin
- busybox cp su /system/bin
- # chmod 4755 /system/bin/su
- chmod 4755 /system/bin/su
- # exit
- exit
- F:\ADB>adb shell
- # su
- su
- #mount -o remount,ro -t yaffs2 /dev/block/mtdblock3 /system
- # exit
- exit
複製代碼 |