Welcome to XDA

Search to go directly to your device's forum

Register an account

Unlock full posting privileges

Ask a question

No registration required
Post Reply

[Root/Write Protection Bypass] MotoX (no unlock needed)

OP jcase

15th September 2013, 01:01 AM   |  #1  
jcase's Avatar
OP Forum Moderator / Senior Recognized Developer - Taco Vendor
Flag Sequim WA
Thanks Meter: 8,354
 
3,951 posts
Join Date:Joined: Feb 2010
Donate to Me
More
The latest OTAs patch this exploit

The "Camera patch" patches the vulnerability we use to gain system user, and pwnmymoto will no longer work on devices with this update.


Warning:
I will not be responsible for damage to your device(s) by using this exploit. Antivirus software and Play services will likely detect this as potentially
malicious. It is an exploit, deal with it or don't use it. Do not mirror these applications without my permission!


Change Log:
1.4.3 detects failed su installation (0 size su) and allows reinstallation
1.4.1 adds reliability, and fixes issues for users when improper permissions are applied to su (Preventing updates).



PwnMyMoto is a replacement for my previously released MotoRoot. PwnMyMoto exploits three vulnerabilities, to gain root access, then to gain write to system. This is a traditional root, and doesn't use any 'hackery' to maintain su access unlike MotoRoot.

First we use bug 9695860 (aka second masterkey) to gain system user, then it uses a symlink attack to gain root access. After gaining root we exploit a flaw in the bootloader, allowing us to bypass the write protection applied to system. In the process we remove stock recovery, so OTAs will not be a worry.

Install PwnMyMoto by running:
Quote:

adb install -r PwnMyMoto-<version and model go here>.apk

Then run PwnMyMoto, depending on the current root status of your phone it will reboot 2 or 3 times, after the last reboot it will uninstall it self and su will be installed on the actual system partition. Please install SuperSu from the market after this step is done.

We have two (ok more but were not going into that) boot modes. First is normal, which boots regular Android, and in this case boots with system write protected. Second is recovery mode, normally it boots recovery without write protection. Our exploit will hijack recovery bootmode and boot Android without write protection.

After running this exploit, if you boot normally /system will be write protected. If you boot to "recovery", Android will boot without write protection. If you wish to edit system, you must boot into "recovery" to do so, any changes made will stick and will work in either bootmode. My suggestion is to make your changes in "recovery" and run the device day to day in normal mode, until we are certain "recovery" mode will be 100% stable for day to day use.

The exploit will uninstall itself after successful exploitation.

To see if write protection is applied, you can run:
Quote:

adb shell getprop ro.boot.write_protect

If it returns '1' then write protection is applied to /system, if it returns '0' then no write protection has been applied.

In the future we will have a replacement recovery, but at this time it is still in development. Enjoy.
Last edited by jcase; 3rd November 2013 at 11:44 PM.
The Following 136 Users Say Thank You to jcase For This Useful Post: [ View ]
15th September 2013, 01:14 AM   |  #2  
Recognized Contributor
Flag Florida
Thanks Meter: 2,960
 
2,323 posts
Join Date:Joined: Mar 2011
Donate to Me
More
Figure I should add that this does not allow usage of custom kernels at this time because everything is still signature checked.
The Following 9 Users Say Thank You to Indirect For This Useful Post: [ View ]
15th September 2013, 01:45 AM   |  #3  
TeeX2.0's Avatar
Senior Member
Thanks Meter: 93
 
332 posts
Join Date:Joined: Jul 2011
"Thank You" just doesn't quite cover it. But THANK YOU!! for making all of our Moto X's more awesome!


donation is forthcoming, good sir.
15th September 2013, 01:47 AM   |  #4  
_MetalHead_'s Avatar
Senior Member
Flag Chicagoland
Thanks Meter: 2,434
 
5,788 posts
Join Date:Joined: Jun 2010
More
If I rooted previously with MotoRoot, should I unroot and uninstall that app first before running this one?
15th September 2013, 01:48 AM   |  #5  
htowngator's Avatar
Senior Member
Thanks Meter: 73
 
751 posts
Join Date:Joined: Mar 2008
So to apply entitlement hack we'd have to write in recovery mode then reboot into normal?

Sent from my HTC One using Tapatalk 4
15th September 2013, 01:52 AM   |  #6  
Dark9781's Avatar
Senior Member
Thanks Meter: 218
 
690 posts
Join Date:Joined: Apr 2009
Quote:
Originally Posted by _MetalHead_

If I rooted previously with MotoRoot, should I unroot and uninstall that app first before running this one?

I didn't and it worked fine. It will also remove the app originally used to root.
The Following User Says Thank You to Dark9781 For This Useful Post: [ View ]
15th September 2013, 01:54 AM   |  #7  
jonathanphx1's Avatar
Senior Member
Thanks Meter: 971
 
1,210 posts
Join Date:Joined: Apr 2010
Donate to Me
More
Your the man jcase, thanks a bunch I still remember back to the Eris days when you Rick Rolled a bunch of us on a ROM you put out. Lol thanks again for this exploit.

jonathanphx1
15th September 2013, 02:03 AM   |  #8  
madquack's Avatar
Senior Member
Thanks Meter: 439
 
698 posts
Join Date:Joined: May 2010
I am in no way trying to reverse engineer your tool, as I don't have a fraction of the knowledge required to do so, however, I am becoming increasingly ripping apart things like this similar to Dan Rosenberg numerous tools. All I've got to say is dex2jar sucks donkey dick for helping me understand these things on a lower level!

The beer is flowing I hope everyone has a good night!

:beer:
15th September 2013, 02:07 AM   |  #9  
Rask40's Avatar
Member
Thanks Meter: 7
 
78 posts
Join Date:Joined: Aug 2013
More
So for my stupid question of the day - how does one boot into recovery on this phone? Is it Power-Up or some other combination? Presuming I need to be in "recovery" to get xposed to stick.

Answered my own question. Fastboot is Power-Down.
Last edited by Rask40; 15th September 2013 at 03:11 AM.
15th September 2013, 02:20 AM   |  #10  
jcase's Avatar
OP Forum Moderator / Senior Recognized Developer - Taco Vendor
Flag Sequim WA
Thanks Meter: 8,354
 
3,951 posts
Join Date:Joined: Feb 2010
Donate to Me
More
Quote:
Originally Posted by du bist krank

I am in no way trying to reverse engineer your tool, as I don't have a fraction of the knowledge required to do so, however, I am becoming increasingly ripping apart things like this similar to Dan Rosenberg numerous tools. All I've got to say is dex2jar sucks donkey dick for helping me understand these things on a lower level!

The beer is flowing I hope everyone has a good night!

:beer:

No obfuscation was done to the Dex, not hiding anything. Try smali

Sent from my GT-I9505G using XDA Premium 4 mobile app

The Following 4 Users Say Thank You to jcase For This Useful Post: [ View ]
Post Reply Subscribe to Thread
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes