Post Reply

[Q] JCase ASEC root?

4th June 2014, 07:43 PM   |  #1  
OP Senior Member
Thanks Meter: 29
 
101 posts
Join Date:Joined: Oct 2012
Just wondering, but with JCase's new moto X exploit being released, could this be used to root the HDX? From what I understand it should work on any android version that supports ASEC.
5th June 2014, 03:20 AM   |  #2  
plasticarmyman's Avatar
Senior Member
Flag Long Beach
Thanks Meter: 80
 
392 posts
Join Date:Joined: Apr 2011
More
This may be a possibility... We'll have to wait and see...

Sent from my Nexus 4
9th June 2014, 08:03 PM   |  #3  
GSLEON3's Avatar
Retired Senior Moderator
Flag NSA Black Site Whiskey Tango Foxtrot One Niner
Thanks Meter: 1,323
 
2,453 posts
Join Date:Joined: Dec 2006
Donate to Me
More
Quote:
Originally Posted by S_transform

Just wondering, but with JCase's new moto X exploit being released, could this be used to root the HDX? From what I understand it should work on any android version that supports ASEC.

Jcase is a good dude. If anyone hasn't already, a polite & to the point PM should be sent to him asking just that. That is exactly what I did that led to the first root.

I personally am still rooted, I don't know exactly what I did differently than everyone else, besides installing safestrap a second time on the rom slot I use, but I have not blocked anything, not deleted or renamed any files, nothing, but updates come & the Kernel & BL fail to flash & it gets stuck in the Bootloader screen. I reboot, still have access to SS & am still rooted every time. Every single update has downloaded & tried to install & every single one has failed.
The Following 2 Users Say Thank You to GSLEON3 For This Useful Post: [ View ]
12th June 2014, 09:13 PM   |  #4  
GSLEON3's Avatar
Retired Senior Moderator
Flag NSA Black Site Whiskey Tango Foxtrot One Niner
Thanks Meter: 1,323
 
2,453 posts
Join Date:Joined: Dec 2006
Donate to Me
More
ASEC...
Hmmmm.... I will have to go through the KF HDX source, but if this exploit exists & it may very well considering it wasn't even fixed by Google until 4.4.2, the ASEC exploit should work just fine on the HDX.

Some interesting info here: http://blog.cassidiancybersecurity.c...old-local-root

Basically the way ASEC exploit works, you can redirect a partition mount to ANYTHING, as long as it is an existing directory & there is an existing symbolic link to the directory. Interesting, even if it is a very old exploit, & very possibly something much easier to accomplish root with than some of the things I have played with, including SED...

---------- Post added at 03:13 PM ---------- Previous post was at 02:50 PM ----------

Hey, guys, I made the suggestion to contact jcase again a few days ago. PLEASE do NOT contact him regarding exploits right now. He is taking a break from this stuff & I hadn't bothered to check with him, or to check his current status.

If I feel like I am onto something, or if anyone else does, please let me know & I can get the idea or possible exploit to someone else. Jcase has done a lot for the XDA community, so give him his well deserved break.
The Following User Says Thank You to GSLEON3 For This Useful Post: [ View ]
Post Reply Subscribe to Thread
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes


Top Threads in Kindle Fire HDX 7" & 8.9" Q&A, Help & Troubleshooting by ThreadRank