FORUMS
Remove All Ads from XDA

[Root/Write Protection Bypass] MotoX (no unlock needed)

6,099 posts
Thanks Meter: 15,158
 
By jcase, Forum Moderator / Senior Recognized Developer - Taco Vendor on 15th September 2013, 12:01 AM
Post Reply Email Thread
The latest OTAs patch this exploit

The "Camera patch" patches the vulnerability we use to gain system user, and pwnmymoto will no longer work on devices with this update.


Warning:
I will not be responsible for damage to your device(s) by using this exploit. Antivirus software and Play services will likely detect this as potentially
malicious. It is an exploit, deal with it or don't use it. Do not mirror these applications without my permission!


Change Log:
1.4.3 detects failed su installation (0 size su) and allows reinstallation
1.4.1 adds reliability, and fixes issues for users when improper permissions are applied to su (Preventing updates).



PwnMyMoto is a replacement for my previously released MotoRoot. PwnMyMoto exploits three vulnerabilities, to gain root access, then to gain write to system. This is a traditional root, and doesn't use any 'hackery' to maintain su access unlike MotoRoot.

First we use bug 9695860 (aka second masterkey) to gain system user, then it uses a symlink attack to gain root access. After gaining root we exploit a flaw in the bootloader, allowing us to bypass the write protection applied to system. In the process we remove stock recovery, so OTAs will not be a worry.

Install PwnMyMoto by running:
Quote:

adb install -r PwnMyMoto-<version and model go here>.apk

Then run PwnMyMoto, depending on the current root status of your phone it will reboot 2 or 3 times, after the last reboot it will uninstall it self and su will be installed on the actual system partition. Please install SuperSu from the market after this step is done.

We have two (ok more but were not going into that) boot modes. First is normal, which boots regular Android, and in this case boots with system write protected. Second is recovery mode, normally it boots recovery without write protection. Our exploit will hijack recovery bootmode and boot Android without write protection.

After running this exploit, if you boot normally /system will be write protected. If you boot to "recovery", Android will boot without write protection. If you wish to edit system, you must boot into "recovery" to do so, any changes made will stick and will work in either bootmode. My suggestion is to make your changes in "recovery" and run the device day to day in normal mode, until we are certain "recovery" mode will be 100% stable for day to day use.

The exploit will uninstall itself after successful exploitation.

To see if write protection is applied, you can run:
Quote:

adb shell getprop ro.boot.write_protect

If it returns '1' then write protection is applied to /system, if it returns '0' then no write protection has been applied.

In the future we will have a replacement recovery, but at this time it is still in development. Enjoy.
The Following 141 Users Say Thank You to jcase For This Useful Post: [ View ]
 
 
15th September 2013, 12:14 AM |#2  
Senior Member
Flag Florida
Thanks Meter: 3,034
 
Donate to Me
More
Figure I should add that this does not allow usage of custom kernels at this time because everything is still signature checked.
The Following 11 Users Say Thank You to Indirect For This Useful Post: [ View ] Gift Indirect Ad-Free
15th September 2013, 12:45 AM |#3  
TeeX2.0's Avatar
Senior Member
Thanks Meter: 101
 
More
"Thank You" just doesn't quite cover it. But THANK YOU!! for making all of our Moto X's more awesome!


donation is forthcoming, good sir.
The Following User Says Thank You to TeeX2.0 For This Useful Post: [ View ] Gift TeeX2.0 Ad-Free
15th September 2013, 12:47 AM |#4  
_MetalHead_'s Avatar
Senior Member
Flag Portland
Thanks Meter: 2,750
 
More
If I rooted previously with MotoRoot, should I unroot and uninstall that app first before running this one?
The Following User Says Thank You to _MetalHead_ For This Useful Post: [ View ] Gift _MetalHead_ Ad-Free
15th September 2013, 12:48 AM |#5  
htowngator's Avatar
Senior Member
Thanks Meter: 120
 
More
So to apply entitlement hack we'd have to write in recovery mode then reboot into normal?

Sent from my HTC One using Tapatalk 4
15th September 2013, 12:52 AM |#6  
Dark9781's Avatar
Senior Member
Thanks Meter: 266
 
More
Quote:
Originally Posted by _MetalHead_

If I rooted previously with MotoRoot, should I unroot and uninstall that app first before running this one?

I didn't and it worked fine. It will also remove the app originally used to root.
The Following User Says Thank You to Dark9781 For This Useful Post: [ View ] Gift Dark9781 Ad-Free
15th September 2013, 12:54 AM |#7  
jonathanphx1's Avatar
Senior Member
Thanks Meter: 971
 
Donate to Me
More
Your the man jcase, thanks a bunch I still remember back to the Eris days when you Rick Rolled a bunch of us on a ROM you put out. Lol thanks again for this exploit.

jonathanphx1
15th September 2013, 01:03 AM |#8  
madquack's Avatar
Senior Member
Thanks Meter: 441
 
More
I am in no way trying to reverse engineer your tool, as I don't have a fraction of the knowledge required to do so, however, I am becoming increasingly ripping apart things like this similar to Dan Rosenberg numerous tools. All I've got to say is dex2jar sucks donkey dick for helping me understand these things on a lower level!

The beer is flowing I hope everyone has a good night!

:beer:
15th September 2013, 01:07 AM |#9  
Rask40's Avatar
Member
Thanks Meter: 7
 
More
So for my stupid question of the day - how does one boot into recovery on this phone? Is it Power-Up or some other combination? Presuming I need to be in "recovery" to get xposed to stick.

Answered my own question. Fastboot is Power-Down.
15th September 2013, 01:20 AM |#10  
jcase's Avatar
OP Forum Moderator / Senior Recognized Developer - Taco Vendor
Flag Sequim WA
Thanks Meter: 15,158
 
10
Donate to Me
More
Quote:
Originally Posted by du bist krank

I am in no way trying to reverse engineer your tool, as I don't have a fraction of the knowledge required to do so, however, I am becoming increasingly ripping apart things like this similar to Dan Rosenberg numerous tools. All I've got to say is dex2jar sucks donkey dick for helping me understand these things on a lower level!

The beer is flowing I hope everyone has a good night!

:beer:

No obfuscation was done to the Dex, not hiding anything. Try smali

Sent from my GT-I9505G using XDA Premium 4 mobile app
The Following 4 Users Say Thank You to jcase For This Useful Post: [ View ]
15th September 2013, 01:32 AM |#11  
kornklown69's Avatar
Senior Member
Flag Springfield, Missouri
Thanks Meter: 808
 
More
anyone else's widgets acting strange?

Sent from my XT1058 using XDA Premium 4 mobile app
Post Reply Subscribe to Thread

Guest Quick Reply (no urls or BBcode)
Message:
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes