[ROOT] HTC One X AT&T 2.20 Firmware - X-Factor root exploit

Search This thread

stumpy352

Senior Member
Sep 20, 2011
2,000
1,267
I just want to set my CID. can I use this software on a Telstra XL? I've searched the thread but didn't find anything related to my question. I'm also on hboot 2.14.

The only reason why I want to change the CID is for the s-off tool. :D

thanks

Like he said. 2.14 hboot & 3.17 telstra firmware. Will this install superCID or not?

Sent from my HTC One XL using xda premium
 

redpoint73

Inactive Recognized Contributor
Oct 24, 2007
15,254
6,968
my problem is that cid says htc_001

Does your One X have the AT&T logo on the front?

---------- Post added at 09:15 AM ---------- Previous post was at 09:14 AM ----------

Like he said. 2.14 hboot & 3.17 telstra firmware. Will this install superCID or not?

I can be mistaken here, but I don't think this exploit works on Telstra. You may need to unlock the bootloader, root, and change CID manually.

The the following (Steps 1 through 11) for instructions on how to change the CID after you have root: http://xdaforums.com/showthread.php?t=1671396
 
Last edited:

jbm76

Senior Member
Does your One X have the AT&T logo on the front?

---------- Post added at 09:15 AM ---------- Previous post was at 09:14 AM ----------



I can be mistaken here, but I don't think this exploit works on Telstra. You may need to unlock the bootloader, root, and change CID manually.

The the following (Steps 1 through 11) for instructions on how to change the CID after you have root: http://xdaforums.com/showthread.php?t=1671396

I did the above steps and I am on Telstra, but hboot 1.11, I was able to change the CID... worked like a charm then was able to get S-OFF :)
 
  • Like
Reactions: gunzy83 and pablo11

brianhill1980

Senior Member
Jul 21, 2012
137
13
Vancouver
Can someone please help me?

I unlocked my bootloader and rooted my phone a long time ago. Says "TAMPERED" & "UNLOCKED" at the top of the bootloader screen. I can't remember what I did, I followed a guide here on xda though. I'm not sure if I already have SuperCID or not. I want to S-Off my phone. From what I understand it makes things a lot easier for flashing.

HBOOT 1.09.0000
Radio 0.23a.32.09.29

No idea what my RUU is. I see people making reference to 1.73, 2.20, but I have no idea what they're talking about.

When I run "fastboot getvar cid" it returns "ROGER001". I tried using this tool because from what I understand it's supposed to read "11111111", but when I run the tool it fails after the 2nd recovery and my CID doesn't change.

I'm really new at this, so please don't burn me at the stake for asking noob questions. I've searched the forums for the last 3 days, but all the information is really confusing and there is no complete guide anywhere, seems it's bits and pieces from here and there that everyone is using and referencing.

Can anyone tell me exactly what I need to do in order to confirm SuperCID, or achieve it?

Thanks!
 

mchun

Member
Dec 14, 2012
40
0
didn't work for me either. I should have done it before I updated. :crying:


I hope there will be an update for the new 3.18 firmware

Dam you ATT
 
Last edited:

justin11141

Senior Member
Apr 30, 2011
329
28
Dallas
is there a way to actually check if im super cid'd? i did the process but it doesn't print supercid11111111 on my bootloader
 

ardabelati

Senior Member
Aug 9, 2011
200
5
Brisbane
Hi all,

I am not sure what I have done wrong but I followed all the instruction but when it comes to restore, I click on restore and restore on the phone screen said "Restore Starting" and then few seconds later it said "restore ended" and failed.

I believe my phone is rooted but I can not get the S-Off done.

Please help
 

ChronoReverse

Senior Member
Jun 14, 2010
1,360
247
Is this necessary if I used HTCdev to unlock my phone? It seem to have TWRP installed fine and root is working.

[edit]Ah doesn't work because I had OTA JB already. Used the other method to get supercid. Thanks anyway![/edit]
 
Last edited:

lightflier

Senior Member
Nov 26, 2009
68
7
Is this necessary if I used HTCdev to unlock my phone? It seem to have TWRP installed fine and root is working.

[edit]Ah doesn't work because I had OTA JB already. Used the other method to get supercid. Thanks anyway![/edit]

I have unlocked, rooted, SuperCIDed and S-Offed after I received the JB OTA. Well... the SuperCID took more than one attend but it worked fine for me.
 

Top Liked Posts

  • There are no posts matching your filters.
  • 286
    I have successfully rooted the AT&T HTC One X running build 2.20.

    In the previous build (1.85), S-ON was only partially enforced, so it was possible to modify the /system partition without having unlocked the bootloader, in order to install su and Superuser.apk. This was changed in build 2.20: full S-ON is now in effect. As a result, it is no longer possible to write to /system even after remounting it as writable, since the S-ON feature has NAND-locked the storage.

    In other words, it's impossible have a "permanent root" on 2.20 in the traditional sense without unlocking the bootloader.

    I have prepared an exploit that gains temporary root access by leveraging two vulnerabilities and uses these newly gained root privileges to overwrite the CID ("superCID"), so that it's possible to unlock the bootloader via HTC's website. I'm sorry if you'd prefer to not unlock your bootloader this way, but there are no other options for root access available.

    ===========
    DISCLAIMER
    ===========

    This exploit modifies the CID of your device. Doing so likely voids your warranty, and may be in violation of your contract with AT&T (I am not a lawyer). Additionally, while this exploit has been tested and has not been observed to cause any negative side effects in practice, I am in no way responsible if it turns your device into an expensive paperweight.

    =============
    INSTRUCTIONS
    =============

    1. Download the exploit from:
    http://vulnfactory.org/public/X_Factor_Windows.zip

    Edit: Linux/Mac version available here. Thanks to Jesse Osiecki (@jesseosiecki) for suggesting I support this and providing me with a working version (that I ended up re-writing):
    http://vulnfactory.org/public/X_Factor_Linux_OSX.zip


    2. Extract the entire zip file.

    3. Connect your device via USB, ensure you have the latest HTC USB drivers installed (only on Windows), and ensure USB debugging mode is enabled.

    4. Double-click "run.bat", or if running Linux or OSX, open a terminal, change directories to the extracted exploit, and run "./run.sh".

    5. Follow the instructions printed by the exploit. You will need to authorize two backup restorations during the exploit's execution.

    6. If the exploit is successful, it will print "[+] Set CID!". If it does not print this, the exploit has failed, so please do not continue.

    7. The exploit will automatically reboot into bootloader mode. Press enter after bootloader mode is finished booting, and the exploit will print your CID. If the exploit was successful, it should return "11111111" as your CID.

    8. If your CID was successfully set, press enter to generate an unlock token.

    9. Visit htcdev.com, navigate to the "Bootloader unlock" section, choose "All other supported models" from the drop-down menu, and provide the unlock token when asked.

    10. After unlocking the bootloader, you can flash a custom recovery partition via fastboot, boot into recovery mode, and use a recovery ADB shell or install from an update.zip to install Superuser and su (I do not provide support for custom recoveries, but this is a straightforward process that other people can help with).

    ======
    NOTES
    ======

    I am not affiliated with any Android forum or group, including XDA - this is just where I've chosen to publish this exploit.

    Portions of this exploit are similar in concept to the ADB backup/restore exploit published by Bin4ry, but the vulnerability used in this exploit is entirely distinct from Bin4ry's.

    ========
    CREDITS
    ========

    Thanks to Michael Coppola for pointing me at the vulnerable driver I leverage for the second phase of the exploit, and props for independently discovering the same vulnerability I used. Thanks to jcase and P3Droid for their continuing support - I owe you guys beers.

    ======
    Paypal
    ======
    http://goo.gl/zBGb0
    5
    Go here for instructions on flashing custom recovery and roms:

    http://xdaforums.com/showthread.php?t=1952076
    5
    It utilizes a temp root to change the CID and therefore unlock
    The unlock is permanent, the root is temporary

    Though after you unlock, just flash a SuperUser zip and you will get permanent root ;)
    4
    Great work man! Congrats.

    And welcome to all the new ROM flashers :)
    4
    It's not working for me, dammit

    /system/bin/sh: /data/local/tmp/pwn: cannot execute - Permission denied

    Sent from my HTC One X using Tapatalk 2


    Sorry, made a small mistake. I've uploaded a new version to the same URL, please re-download and try again.