FORUMS

Galaxy S6 & Edge get €100 Price Cut—New Models Incoming

Samsung has dropped the price of both the Galaxy S6 and S6 Edge by … more

How To Port Fully Featured Sony Xperia Z4 Camera

Xperia Z4’s hardware may not impress, but its software is definitely … more

Experimental TWRP Available For Moto G 2015

XDA Senior Member squid2 has posted experimental builds of TWRP for the Moto G … more

Sunday Debate: How Can We Get a No-Compromise Phone?

Join us in a fun Sunday Debate on Compromises. Come with your opinions and … more

Anyone on stock unrooted MJ7 (Android 4.3) build willing to test new root method?

2,537 posts
Thanks Meter: 3,641
 
By open1your1eyes0, Senior Member on 4th November 2013, 05:30 PM
Post Reply Subscribe to Thread Email Thread
TheJumpingBean
4th November 2013, 10:17 PM |#31  
Guest
Thanks Meter: 0
 
More
Quote:
Originally Posted by jpolzner

You were able to update the SuperSU binaries? Or you were simply able to achieve root?

Sent from my SCH-I545 using Tapatalk

I can't update the SU binaries, but am fully rooted. I wonder if haxxor had better luck... ill txt him and ask
 
 
4th November 2013, 10:20 PM |#32  
Senior Member
Thanks Meter: 42
 
More
I wonder if we'll in general get the updates through app on mj7. I updated from mi1 but updated the binary before. Don't know enough about this knox and selinux enforcing.

Sent from my SCH-I545 using Tapatalk
4th November 2013, 10:49 PM |#33  
Senior Member
Flag Southwest, MO
Thanks Meter: 64
 
More
More...
Quote:
Originally Posted by kdo23

I wonder if we'll in general get the updates through app on mj7. I updated from mi1 but updated the binary before. Don't know enough about this knox and selinux enforcing.

Sent from my SCH-I545 using Tapatalk

I actually suspect that the SE Linux kernel is as much to blame for not being able to update the su binary as the actual app itself. I am able to fully modify my system partition via root shell, but a lot of GUI based apps cannot.
4th November 2013, 10:55 PM |#34  
Surge1223's Avatar
Recognized Contributor
Flag Iowa
Thanks Meter: 5,700
 
Donate to Me
More
Quote:
Originally Posted by kdo23

I wonder if we'll in general get the updates through app on mj7. I updated from mi1 but updated the binary before. Don't know enough about this knox and selinux enforcing.

Sent from my SCH-I545 using Tapatalk

I haven't got done looking through the logs yet but this sticks out so far

Code:
11924/system/bin/app_process/system/app/Superuser.apk
11924/system/bin/app_process/data/data/com.mgyun.shua.su/databases/download_status.db
11924/system/bin/app_process/data/data/com.mgyun.shua.su/databases/app_info.db
11924/system/bin/app_processanon_inode:inotify
11924/system/bin/app_process/dev/ptmx
11924/system/bin/app_processpipe:[29717]
11924/system/bin/app_processpipe:[29717]
11924/system/bin/app_processanon_inode:
11942/system/bin/mksh/system/framework/framework-res.apk
11942/system/bin/mksh/system/framework/core.jar
11942/system/bin/mksh/dev/urandom
11942/system/bin/mkshpipe:[28435]
11942/system/bin/mkshpipe:[28435]
11942/system/bin/mkshanon_inode:[eventpoll]
11942/system/bin/mksh/system/app/Superuser.apk
11942/system/bin/mkshanon_inode:inotify
11942/system/bin/mksh/dev/pts/0
11949/system/bin/.suv/dev/pts/0
11949/system/bin/.suv/dev/pts/0
11949/system/bin/.suv/dev/pts/0
11949/system/bin/.suvsocket:[29724]
11949/system/bin/.suv/dev/com.mgyun.shua.su.daemon/11949.stdout
11949/system/bin/.suv/dev/com.mgyun.shua.su.daemon/11949.stderr
11949/system/bin/.suv/dev/com.mgyun.shua.su.daemon/11949.stdin
11949/system/bin/.suv/dev/__properties__
11949/system/bin/.suv/sys/kernel/debug/tracing/trace_marker
11949/system/bin/.suv/system/framework/framework.jar
11949/system/bin/.suv/system/framework/twframework-res.apk
11949/system/bin/.suv/system/framework/framework-res.apk
11949/system/bin/.suv/system/framework/core.jar
11949/system/bin/.suv/dev/urandom
11949/system/bin/.suvpipe:[28435]
11949/system/bin/.suvpipe:[28435]
11949/system/bin/.suvanon_inode:[eventpoll]
11949/system/bin/.suv/system/app/Superuser.apk
11949/system/bin/.suvanon_inode:inotify
11949/system/bin/.suv/dev/pts/0
11953/system/bin/su/dev/null
11953/system/bin/su/dev/null
11953/system/bin/su/dev/null
11953/system/bin/su/dev/ptmx
11953/system/bin/susocket:[24427]
11953/system/bin/su/dev/com.mgyun.shua.su.daemon/11949.stdout
11953/system/bin/su/dev/com.mgyun.shua.su.daemon/11949.stderr
11953/system/bin/su/dev/com.mgyun.shua.su.daemon/11949.stdin
11953/system/bin/su/dev/__properties__
11960/system/bin/su/dev/pts/2
11960/system/bin/su/dev/pts/2
11960/system/bin/su/dev/pts/2
11960/system/bin/su/dev/__properties__
11969/dev/com.mgyun.shua.su.daemon/sh/dev/pts/2
11969/dev/com.mgyun.shua.su.daemon/sh/dev/pts/2
11969/dev/com.mgyun.shua.su.daemon/sh/dev/pts/2
11969/dev/com.mgyun.shua.su.daemon/sh/dev/__properties__
11969/dev/com.mgyun.shua.su.daemon/sh/dev/tty
12091/system/bin/app_process/dev/null
12091/system/bin/app_process/dev/null
12091/system/bin/app_process/dev/null
12091/system/bin/app_process/dev/log/main
12091/system/bin/app_process/dev/log/radio
12091/system/bin/app_process/dev/log/events
12091/system/bin/app_process/dev/log/system
Sent from my SCH-I535 using xda app-developers app
Last edited by Surge1223; 4th November 2013 at 11:00 PM.
TheJumpingBean
4th November 2013, 11:57 PM |#35  
Guest
Thanks Meter: 0
 
More
Later on a friend of mine is going to decompile the su file and see what's in it

Sent from my SCH-I545 using Tapatalk
The Following User Says Thank You to For This Useful Post: [ View ]
5th November 2013, 12:11 AM |#36  
open1your1eyes0's Avatar
OP Senior Member
Flag New York City
Thanks Meter: 3,641
 
Donate to Me
More
I have a few high level devs looking into these root exploits to see exactly what is going. Don't worry guys, we'll get to the bottom of these odd and sketchy methods. Whatever it is, the exploits themselves for actually gaining root are working so we're trying to see if we can recreate them into our own guaranteed safe method.
The Following 10 Users Say Thank You to open1your1eyes0 For This Useful Post: [ View ]
5th November 2013, 12:20 AM |#37  
Senior Member
Thanks Meter: 62
 
More
You think maybe they don't want it open source so that Verizon will have trouble trying to patch it? Just a thought.

Sent from my SCH-I545 using xda app-developers app
5th November 2013, 12:25 AM |#38  
Member
Flag Goldsboro
Thanks Meter: 21
 
More
Quote:
Originally Posted by open1your1eyes0

I have a few high level devs looking into these root exploits to see exactly what is going. Don't worry guys, we'll get to the bottom of these odd and sketchy methods. Whatever it is, the exploits themselves for actually gaining root are working so we're trying to see if we can recreate them into our own guaranteed safe method.

Thanks for looking into this! I was debating using one of these methods for the last couple hours. But the more I read the more hesitant I got. Think I'll hold of to see what you guys come up with.

Sent from my SCH-I545 using xda app-developers app
5th November 2013, 12:27 AM |#39  
Member
Flag Cleveland, OH
Thanks Meter: 3
 
More
Quote:
Originally Posted by joeyx2

You think maybe they don't want it open source so that Verizon will have trouble trying to patch it? Just a thought.

Sent from my SCH-I545 using xda app-developers app

This is a exploit that covers a lage range of devices written by Chinese devs...... I seriously doubt they care about what Verizon will do.

Sent from my SCH-I545 using Tapatalk
5th November 2013, 01:04 AM |#40  
Senior Member
Thanks Meter: 62
 
More
Quote:
Originally Posted by jwendt79

Thanks for looking into this! I was debating using one of these methods for the last couple hours. But the more I read the more hesitant I got. Think I'll hold of to see what you guys come up with.

Sent from my SCH-I545 using xda app-developers app

I see your point but let me reword that. So ANYBODY can't patch the exploit. Though I will say of I was on stock mj7 I wouldn't do it. Long time ago I had some transactions from my account in China or Japan (long time ago so I can't remember) and luckily my bank realized I can't make transactions over seas and in the US on the same day. I think it was when using apps to root was popular and that's how they got my info. Be careful everybody!

Sent from my SCH-I545 using xda app-developers app
5th November 2013, 01:05 AM |#41  
Surge1223's Avatar
Recognized Contributor
Flag Iowa
Thanks Meter: 5,700
 
Donate to Me
More
After I posted what I saw in the log I recieved, I though it might be a good idea to begin reverse engineering this thing as well. Doesnt that log look sketchy to anyone else? It was enough to give me the green light on starting ida lol.

P.S.

Can someone run this command below in terminal then immediatley proceed to attempt to update the su binaries (while keeping terminal running) Then after it fails, go in back to terminal, hold vol down and press the letter "d" to end the terminal process if its still going, and finally save the output then post/pm it to me?

Code:
busybox cat /system/bin/*
Sent from my SCH-I535 using xda app-developers app

Read More
Post Reply Subscribe to Thread

Tags
mj7, root, vruemj7
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes