If a system dump using dd were available, would it be safe to restore it using dd, or would that corrupt the OS?
Sent from my HTC Glacier using Tapatalk
Sent from my HTC Glacier using Tapatalk
Find a system dump for your phone, reinstall then run the reverse of zergrush (rm is delete in adb)
Sent from my R800x using XDA App
Searched high and low for a stock system dump of the Exhibit. No luck. Any ideas please? Thank you!!!
Sorry dude, looks like there aren't any hiding out there (even samsung doesn't have a stock rom available)
what you could try is find somebody else with an exhibit, and have them pull /system/app and then on your phone, re-root it, and push their file....
(1) other person types "adb pull /system/app C:\[path to where they want to save it]
2) zips up file, and emails it/puts it on dropbox/etc
3) you download and extract file and type "adb push C:\[path to where you saved it] /system/app")
Good luck, I suggest you offer people $$ to do it...
My wife has the same phone as me. So I could try to grab hers. Could you please tell me how to execute those commands? Would I just install the android sdk on a pc and issue those commands via command prompt?
Sorry dude, looks like there aren't any hiding out there (even samsung doesn't have a stock rom available)
what you could try is find somebody else with an exhibit, and have them pull /system/app and then on your phone, re-root it, and push their file....
(1) other person types "adb pull /system/app C:\[path to where they want to save it]
2) zips up file, and emails it/puts it on dropbox/etc
3) you download and extract file and type "adb push C:\[path to where you saved it] /system/app")
Good luck, I suggest you offer people $$ to do it...
What you propose has one serious flaw - if you are copying to your desktop and back, you will lose proper file permissions. This can serious f**k up Android.
What you propose has one serious flaw - if you are copying to your desktop and back, you will lose proper file permissions. This can serious f**k up Android.
That's probably the best option out there
If you do root again, be very very careful about what you remove. There really isn't much information out there for the Exhibit, and unless you wanna be the pathfinder for everybody, be careful
$ chmod 755 /data/local/zergRush
$ /data/local/zergRush
[**] Zerg rush - Android 2.2/2.3 local root
[**] (C) 2011 Revolutionary. All rights reserved.
[**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew.
[+] Found a GingerBread ! 0x00017118
[*] Sending 149 zerglings ...
[*] Trying a new path ...
[*] Sending 149 zerglings ...
[*] Trying a new path ...
[*] Sending 149 zerglings ...
[*] Trying a new path ...
[*] Sending 149 zerglings ...
[+] Zerglings caused crash (good news): 0x401219c4 0x0054
[*] Researching Metabolic Boost ...
[+] Speedlings on the go ! 0xafd260a9 0xafd39f9f
[*] Poping 24 more zerglings
[*] Sending 173 zerglings ...
[+] Rush did it ! It's a GG, man !
[+] Killing ADB and restarting as root..enjoy!
# id
uid=0 gid=0
I have tried the most recent zergRush on my Vizio VTAB 1008 running Gingerbread 2.3.2 and this exploit did not work. Here is the complete output which I ran in manual mode.
$ ./zergRush
[**] Zerg rush - Android 2.2/2.3 local root
[**] (C) 2011 Revolutionary. All rights reserved.
[**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew.
[+] Found a GingerBread ! 0x00015118
[*] Scooting ...
[*] Sending 149 zerglings ...
[+] Zerglings found a way to enter ! 0x10
[+] Overseer found a path ! 0x000151e0
[*] Sending 149 zerglings ...
[+] Zerglings caused crash (good news): 0x40119cd4 0x0054
[*] Researching Metabolic Boost ...
[+] Speedlings on the go ! 0x8001a737 0x8003a4bf
[*] Popping 24 more zerglings
[*] Sending 173 zerglings ...
[-] Bad luck, our rush did not succeed
I did notice that other earlier versions of zergRush had been tried on this tablet but none succeeded in rooting it.
Is it possible to modify the exploit so that it could succeed on this device? Or is it possible that this vulnerability has been patched and will not succeed at all?
Any help provided by anyone will be HUGELY appreciated. If this helps, I do have the Android source code installed and am able to compile this from source code as needed.
All other exploits have failed on this tablet. I have tried rageagainsthecage, gingerbreak, etc. It is difficult to believe that Vizio has made such a secure tablet with no exploitable vulnerabilities.
Thanks again... Getting desperate...
Getting "[-] Cannot copy boomsh.: Permission denied" from the shell when attempting to run zergRush on HTC Amaze. This was the 2nd time running on this phone after a reboot. The 1st time was successful, however my wife pulled me away so I couldn't finish what I wanted to do with root. No, I'm not going to divorce her over this.
Code:macpro:platform-tools $ /android/platform-tools/adb push /android/temp/zergRush /data/local/zergRush 2076 KB/s (21215 bytes in 0.009s) macpro:platform-tools $ /android/platform-tools/adb shell $ chmod 755 /data/local/zergRush $ /data/local/zergRush [**] Zerg rush - Android 2.2/2.3 local root [**] (C) 2011 Revolutionary. All rights reserved. [**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew. [-] Cannot copy boomsh.: Permission denied $ macpro:platform-tools $