Bootloader Unlocked- Discussion

Search This thread

con247

Retired Recognized Developer
Sep 1, 2010
3,154
3,108
Ann Arbor
How To Unlock:
Best way to unlock: Play Store app that does it automatically

Visit Adam's original announcement post:
http://xdaforums.com/showpost.php?p=30274025&postcount=317

Huge thanks to everyone in the Research thread spending countless hours to get the job done and the person that made the leak possible!



Old Info (for reference only!):
(Text in RED are my safety additions):
Here's how to do it manually without CASUAL. All credits to Adam.

From a computer with adb on a rooted device:

Code:
adb push aboot.img /sdcard/aboot.img

adb shell

su

dd if=/sdcard/aboot.img of=/dev/block/mmcblk0p5
Verify you got a good flash:
Code:
dd if=/dev/block/mmcblk0p5 of=/sdcard/abootTEST.img
Now, check the MD5 of abootTEST.img BEFORE you turn your phone off. If it is wrong, reflash again until it is correct. It should be the same as the original aboot.img you already checked the MD5 of.

Also can be done via downloading the attachment, putting at root of /sdcard/ and doing these commands in terminal on a rooted device:

Code:
su

dd if=/sdcard/aboot.img of=/dev/block/mmcblk0p5


Verify you got a good flash:
Code:
dd if=/dev/block/mmcblk0p5 of=/sdcard/abootTEST.img
Now, check the MD5 of abootTEST.img BEFORE you turn your phone off. If it is wrong, reflash again until it is correct. It should be the same as the original aboot.img you already checked the MD5 of.


MD5 (aboot.img) = 0ba9ad45fc15cf3d62af7dd363686b3f
 
Last edited:

jmw03j

Member
Apr 20, 2011
17
2
So who am I buying a beer or three for, do they wish to remain anonymous for the time being? Maybe I just missed the reference in the research thread.

Limitations on my newbie account are killing me.

Thanks for all the hard work everyone who was involved in the research, I enjoyed following the process over the last few weeks!
 
Last edited:

Karl

Senior Member
Nov 27, 2009
1,626
471
California
All i can say is...


Take that Verizon :highfive:



Damn now i got break out Vmware
 
Last edited:

jgrimberg1979

Senior Member
May 16, 2010
1,002
226
D.C
OK so I ran the program on my wife's mac (I can't stand mac) and followed the instructions and it said it was successful but the phone never rebooted. How do I known if it worked?

Sent from my SCH-I535 using Tapatalk 2
 

Top Liked Posts

  • There are no posts matching your filters.
  • 16
    How To Unlock:
    Best way to unlock: Play Store app that does it automatically

    Visit Adam's original announcement post:
    http://xdaforums.com/showpost.php?p=30274025&postcount=317

    Huge thanks to everyone in the Research thread spending countless hours to get the job done and the person that made the leak possible!



    Old Info (for reference only!):
    (Text in RED are my safety additions):
    Here's how to do it manually without CASUAL. All credits to Adam.

    From a computer with adb on a rooted device:

    Code:
    adb push aboot.img /sdcard/aboot.img
    
    adb shell
    
    su
    
    dd if=/sdcard/aboot.img of=/dev/block/mmcblk0p5
    Verify you got a good flash:
    Code:
    dd if=/dev/block/mmcblk0p5 of=/sdcard/abootTEST.img
    Now, check the MD5 of abootTEST.img BEFORE you turn your phone off. If it is wrong, reflash again until it is correct. It should be the same as the original aboot.img you already checked the MD5 of.

    Also can be done via downloading the attachment, putting at root of /sdcard/ and doing these commands in terminal on a rooted device:

    Code:
    su
    
    dd if=/sdcard/aboot.img of=/dev/block/mmcblk0p5


    Verify you got a good flash:
    Code:
    dd if=/dev/block/mmcblk0p5 of=/sdcard/abootTEST.img
    Now, check the MD5 of abootTEST.img BEFORE you turn your phone off. If it is wrong, reflash again until it is correct. It should be the same as the original aboot.img you already checked the MD5 of.


    MD5 (aboot.img) = 0ba9ad45fc15cf3d62af7dd363686b3f
    9
    Verizon, when the f*ck will you learn that you will never win? This is such good news!
    6
    Since this is a bootloader image, I'd highly advise everyone to make sure they got a clean download by checking the MD5. It should be:

    A98D7FD72E2FF67341C5E029B5A2E839
    5
    Is anyone else interested in HOW it was cracked? I've been following the thread from the beginning and wished there was a better explanation of what the exploit was
    5

    Mine still says enable as well.

    For those rooted with terminal emulator and who want to do this without linux or a mac here are some quick steps.

    1) Download the original .jar offered in this post.
    2) Extract it and go into SCRIPTS directory
    3) Extract the Flash Secure Aboot.zip
    3) Copy the aboot.img to your phones Sdcard/Download directory
    4) Open Terminal Emulator on your phone, its free to download
    5) Type in: su, at this point it should ask for SuperUser access, allow it.
    6) Type in: dd if=/sdcard/Download/aboot.img of=/dev/block/mmcblk0p5
    7) That's it!

    Kudos to zepfloyd who posted that command on http://www.droid-life.com/2012/08/15/unsecure-bootloader-can-now-be-flashed-to-verizons-galaxy-s3/, I just posted a quick tutorial.