[4.4 ROOT] [BOUNTY] New Root Method Exploit or Full Bootloader Unlock Droid Maxx

Search This thread

rmjones2006

Senior Member
Sep 16, 2013
250
77
birmingham
Edit: $2600 total. This does not include the extra $255 for boot loader unlock

Sent from my XT1080 using Tapatalk
 
Last edited:

kanagadeepan

Senior Member
Jul 27, 2011
189
40
Sivakasi
I got this phone for the battery and it has got 4.4 when I receive it. (I am in India). Walking with an android phone without root is like walking on road wearing just underwear.

I will give 50$ to the dev who found and share the method / way to root MAXX running KitKat by Western Union or PayPal whichever method he likes...
 

rmjones2006

Senior Member
Sep 16, 2013
250
77
birmingham
List of Donators
1. 92029 - $20
2. Teksu - $20
3. Danman7- $20
4. Dragon31337 $100 on bootloader unlock on 4.4, not for root.
5. NWKENT $100
6. spiral777 $20
7. SomeoneE1se $20
8. jfriend33 $20
9. quizzard $25
10. fat_tire $20
11. reddawn71 $75
12. ssgtob1 $20
13. YoungSkeezy $20
14. runner1717 $25
15. elkster88 $25
16. hexnaught $50
17. AlmostTactful $40
18. jtoTTy $100
19. Jewveeski $20
20. adrialk $20
21. jcase $20
22. daca1001 $30
23. kappadappa $20
24. an21281 $25
25. Dr. Carpenter $10
26. bwell1983 $20
27. allquixotic - $40
28. quagss - $10
29. rpierson - $20
30. rmjones2006 - $10
31. trainzzz - $25
32. knighthawk65 - $25
33. njdurkin - $20
34. camaro4life18 - $20
35. MonkeyMouth - $25
36. Indigo Wine - $20 for bootloader unlock + $30 via brute force method + $80 for algorithm (total possible $130)
37. johnmansfield - $20
38. Macificient - $50
39. Davey126 - $50
40. doogald - $10
41. Kenvp - $25
42. JoshManning - $25
43. Allmotor22 - $150
44. thetoolbox - $25
45. gbum213 - $10
46. The Big Lion - $50
47. GGinz - $50
48. dccrens - $50
49. CoryDunbar - $60 (willing to add $100 more if bootloader is included)
50. bgjerseth - $20
51. bwheelies - $25
52. benjamin1492 - $50
53. SpazC - $20
54. malikmrz - $500
55. CarnivoreMatt - $150
56. loungin_in_lg - $20
57. rds217 - $50
58. sp47 - $50
59. pmdc2952 - $50
60. djnikko - $10
61. kanagadeepan - $50
62. cbrady1981 - $25
This brings the bounty to $2,575 (not including Indigo Wine's bounty of up to $130 for bootloader, CoryDunbar's extra $100 for bootloader, and Dragon31337's $100 for bootloader)

Total - $2,575, $2,905 if bootloader unlocked as well

@92029, will you update the first post please
 
Last edited:
  • Like
Reactions: spiral777

summer.cat

Senior Member
Mar 15, 2012
63
73
Voronezh
donate

I'm ready to donate about 20$ for rooting and 30$ for bootloader unlock way.

a bit of offtop:
i researching how to hack bootloader and find a way how to put our device into low-level pre-bootloader mode. In this mode you cat flash Blank Boot by special qualcomm utility.
Also, i find the same theme at xda here
and found interesting information how to change values into protected memory blocks to remove validation of firmware parts - by JTAG.
If somebody wants to know about it, i'll share this information.
But i think - it's terrible, very dangerous way even trying to unlock this method. But, as i think - it's 100% working, 'cause it program into low-level mode, like at the factory.
 
Last edited:

bigv5150

Senior Member
Jan 8, 2011
1,275
360
40 bucks give or take a dollar (exchange rate). Yes I'm unlocked from using it

Sent from my XT1080 using xda app-developers app
 

Franzie3

Senior Member
Sep 24, 2010
1,709
853
Newburgh, NY
Last time I'll speak out of topic. I will start a new thread tomorrow about the boot loader unlock. It will be just what to do. No links or nothing. You need to know the risk and what you are doing before you do it. Some have had no issues others have some. Would do now I'm just not around

Sent from my XT1080 using Tapatalk

Here's the topic I started. let's leave this strictly for the bounty and all bounty related chat

http://xdaforums.com/showthread.php?p=51026939
 
Last edited:

rds217

Member
Sep 17, 2013
38
10
New York
I'll withdraw my $50 from the bounty, I've unlocked my bootloader and am trying to assist others who wish to do the same. I just ran into some significant, unexpected expenses, and every dollar will count for the next few months.
Sorry
 
Last edited:

Tijmen

Retired Forum Moderator
May 26, 2011
1,682
2,600
30
Rotterdam
Thread cleaned.

I have deleted everything not directly related to the bounty, we'll want to keep stuff involving amounts of money like this transparent and uncluttered. If you want to discuss something not directly related to the bounty, i.e. something not about adding or revoking your contribution, do it in one of the many discussion threads. Let's keep this thread on rails, people.
 

jtoTTy

Member
Jan 19, 2014
10
4
Please withdraw my $100 towards the bounty (note that my post to bump from $50 to $100 got deleted).

For me, there was a lot of interesting stuff going on in this thread (~66 pages worth), which I have been monitoring at least daily since it was created. While the reasoning and work behind cleaning up a thread is admirable, much of the information that is now lost does not exist elsewhere. I suppose people (myself not excluded) who post interesting things slightly off-topic are to blame, but the primary reason I want to withdraw my bounty is because I no longer wish to monitor this thread if it's just going to be about the money and not the status of getting root on our devices. If I had any value to add to the root discussion, I'd create such a thread myself.
 
  • Like
Reactions: aviwdoowks

Top Liked Posts

  • There are no posts matching your filters.
  • 16
    Could you explain the process to sustain untethered root?

    From what I understand the process is
    1. Downgrade to 19.5.3
    2. Use Jcase exploit
    3. use MotoWpNoMo
    4. use Safestrap by hashcode?
    5. grab SuperSU pro a& upgrade to 19.6.3

    Won't restarting remove root and r/w protection?

    !!! The below has been edited I think to the most recent instructions and tips. It now longer than the original post. !!!

    I am not posting direct links to files, nor am I claiming fame for the below instructions. I am simply gathering together what I used to obtain root and disable write protection. All credit goes to the people I mentioned and their threads.

    #1 = Downgrade to version 19.5.3 following these instructions by @TechSavvy2 using his link http://xdaforums.com/showthread.php?t=2580060
    #1 1/2 = Downgrade to version 19.5.3 following @TechSavvy2 instructions but use this file to prevent your data from being wiped. You do not have to edit this file or its components which is nice. Post from @NWKENT http://xdaforums.com/showpost.php?p=53164040&postcount=297
    #2 = Download exploit by @jcase and following his instructions for temporary "tether" root. http://xdaforums.com/moto-x/orig-development/root-4-4-x-pie-motorola-devices-t2771623
    #3 = Follow instructions for and download the MotoWpNoMo utility. Original poster is @beaups Link to that page is http://xdaforums.com/moto-x/orig-development/kill-write-protection-motowpnomo-t2551113
    #4 = Follow @xDroid4Lifex prompts to use both @jcase exploit and his findings to obtain permanent root on update 19.5.3. Link to xDroid4Lifex post on jcase thread. http://xdaforums.com/showpost.php?p=53170363&postcount=17 However, during the process of obtaining root, SuperSU will be installed to XBIN, not System. Follow step 5 or 5 1/2 to get SuperSU installed to the System. (<<<<EDITED)
    #5 = EDITED!!! At this time, different parties have had success with using Safestrap to flash SuperSU in Safestrap Recovery. See @xDroid4Lifex post here >> Quote "You need to download a SuperSu.zip and flash that in safestrap to get Superuser installed to the system. Go here for the supersu.zip - http://download.chainfire.eu/supersu " End Quote. Here is the link on how to flash Safestrap Recovery http://xdaforums.com/showthread.php?t=2503897 (XPosed is not needed to make this root permanent.)
    #5 1/2 = I never used Safestrap to get SuperSu installed to the System and out of XBIN. But in my haste to get root, I never wrote down what I did. I am instead going to loosely quote @basestamp "........... I have SuperSU on the system without using Safestrap. I followed all your instructions. I had to repeat the Motowpnomo several times because of the USB debugging, so I had SuperSU & Pro already installed on my phone. Initially, Supersu was running only in xbin? mode, so most of the settings were grayed out. When Motowpnomo finally ran successfully, its installer said it flashed supersu to system. I rebooted my phone and it had the newest SuperSU running. I just now uninstalled all SuperSu updates and the system apk version is 1.75. I have never used or installed Safestrap or unlocked the bootloader for this phone." Also in my quest to get SuperSU to System, I had uninstalled SuperSU that was installed by motowpnomo and @jcase other method "PIE". At that point, it was rolled back to an older version instead of completely uninstalling. After it was rolled back, I installed SuperSU Pro and updated SuperSU from the Play Store. I now have root installed to System.
    #6 = Grab SuperSu and SuperSu Pro and enable Survival Mode. (Edit: By this time you will already have SuperSU. Just get SuperSU Pro and enable Survival Mode.) (Edit: Thanks @bagheadinc)
    #7 = Allow and install Over-The-Air update to 19.6.3.
    Results = You now have a rooted and write protection disabled Motorola Droid MAXX XT1080M consumer edition running Kitkat 4.4 with update 19.6.3. Browse around the forums or the "interwebs" for instructions on how to freeze further updates from Motorola.


    Timmy
    12
    So I took the KitKat 4.4 update on my Maxx. Needless to say, I now have dissolved my primary means of internet connectivity. I have scoured the forums and I found a lot of people asking about how to root when you are already running 4.4.

    I tried downgrading the firmware, using RSD Lite, but I got errors (as you cannot downgrade). Since I am now stuck with 4.4 I figured I'd make the best of it.

    Not sure about the procedures on the forum, as this is my first post, but I want to have a bounty here.

    I got $20.00 on the bounty for whoever roots 4.4. I know there are others asking about it here: http://xdaforums.com/newreply.php?do=newreply&noquote=1&p=49493942

    MODS: As I am new to this forum, forgive me if I'm overstepping my boundaries here.

    Be the first person to create or find a method to achieve the following:

    Exploiting a fully stock Droid Maxx 4.4 build to get root
    Make a post in this thread with the following:
    1. Proving it works with appropriate photos and/or screenshots
    2. Providing full step-by-step instructions for which anyone else can follow
    3. Wait for at least one member to follow the same method and confirm it works the same on their fully stock device with 4.4 KitKat build
    4. Claim your bounty via PM from donator(s)

    Payment will be processed between each member and the bounty collector via PM on an individual basis

    I'll update this page daily as I currently only have temporary internet access

    List of Donators

    1. 92029 - $20*
    2. Teksu - $20*
    3. Danman7- $20*
    4. Dragon31337 $100 on bootloader unlock on 4
    5. NWKENT $100*
    6. spiral777 $20*
    7. SomeoneE1se $20*
    8. jfriend33 $20*
    9. quizzard $25*
    10. fat_tire $20*
    11. reddawn71 $75*
    12. ssgtob1 $20*
    13. YoungSkeezy $20*
    14. runner1717 $25*
    15. elkster88 $25*
    16. hexnaught $50*
    17. AlmostTactful $40*
    18. jtoTTy $100*
    19. Jewveeski $20*
    20. adrialk $20*
    21. jcase $20*
    22. daca1001 $30*
    23. kappadappa $20*
    24. an21281 $25*
    25. Dr
    26. bwell1983 $20*
    27. allquixotic - $40*
    28. quagss - $10*
    29. rpierson - $20*
    30. rmjones2006 - $10*
    31. trainzzz - $25*
    32. knighthawk65 - $25*
    33. njdurkin - $20*
    34. camaro4life18 - $20*
    35. MonkeyMouth - $25*
    36. Indigo Wine - $20 for bootloader unlock + $30 via brute force method + $80 for algorithm (total possible $130)*
    37. johnmansfield - $20*
    38. Macificient - $50*
    39. Davey126 - $50*
    40. doogald - $10*
    41. Kenvp - $25*
    42. JoshManning - $25*
    43. Allmotor22 - $150*
    44. thetoolbox - $25*
    45. gbum213 - $10*
    46. The Big Lion - $50*
    47. GGinz - $50*
    48. dccrens - $50*
    49. CoryDunbar - $60 (willing to add $100 more if bootloader is included)*
    50. bgjerseth - $20*
    51. bwheelies - $25*
    52. benjamin1492 - $50*
    53. SpazC - $20*
    54. malikmrz - $500*
    55. CarnivoreMatt - $150*
    56. loungin_in_lg - $20
    57. rds217 - $50
    58. sp47 - $50
    59. pmdc2952 - $50
    60. djnikko - $10
    61. kanagadeepan - $50
    62. cbrady1981 - $25

    This brings the bounty to $2,575 (not including Indigo Wine's bounty of up to $130 for bootloader, CoryDunbar's extra $100 for bootloader, and Dragon31337's $100 for bootloader)

    Total -*$2,575, $2,905*if bootloader unlocked as well*

    Alternative Thread: http://xdaforums.com/showthread.php?t=2613440 Mirrored OP CLOSED
    8
    Hey everybody look! Another person who doesn't have the facts!

    I wasn't the one that posted I had it on XDA. Someone else did, I intentionally did not post about it here because of people like yourself. Someone copied my comments from another website and posted them on XDA. I said nothing (originally) on XDA because people here often misconstrue or just don't understand the facts (yes here I'm saying you are unable or unwilling to understand the facts).

    Its a root exploit, it does not install su, does not give root to apps, does not remove write protection from system, but since some people (including you) don't understand that just getting root isnt enough to make it useful, I guess I have to explain it. See, with write protection, you can't install su nor set up install-recovery.sh to start the su daemon at boot time, which means ... it isn't useful to you. IT IS OF NO PRACTICAL USE TO THE AVERAGE USER, and this is the reason I did not debut it on XDA. Maybe at some-point I can find a vulnerability to let me bypass write protection again, and it could become useful, but right now it isn't useful.

    Get your facts straight, else you look foolish.


    I don't think it's that people are angry that they can't have stuff for free, since this is literally the thread where money is being offered in exchange for root, and plenty of people were content to buy the bootloader unlock while it was active (and those who didn't were skittish about sending their money to a potentially overseas stranger, not disinterested in paying altogether).

    No, people are annoyed because jcase could've just said nothing. What was the reaction going to be other than, "Hey jcase, why did you post in this thread about paying a bounty for root to tell people that you have a root method but don't want the bounty?" and "Are you sure you won't let us in on your root method in exchange for this money?"

    He's basically taunting people, even if inadvertently. How else do you reconcile "Anyone who wants to can use X tools and read about old exploits to do this just like I did!" side by side with "I'm a professional who does this for a living and my livelihood depends on no one else being able to recreate this exploit"? And now he's saying that his exploit wouldn't be useful to most people anyway?

    Kinda a **** move, and weirdly attention-seeking. But for some reason, loads of you are eager to ignore or defend it because of his past'contributions to the community. And it's really not out of some sense of respect either, since it's so transparent that many whiteknights are waiting for jcase to PM them with a very special thank you ;), like a friend of a lotto winner who self-righteously chides all of the greedy people coming out of the woodwork while quietly hoping to get a reward for being so dauntlessly supportive and unselfish.



    Sent from my Nexus 5 using XDA Premium 4 mobile app
    7
    Thread cleaned
    This is not an off-topic hangout
    Stick to the topic or take it to the off-topic sections
    Thanks
    FNSM
    7
    $20 for a new, 100% original root exploit (involving no publicly known flaw).

    I can play too.