- This will not work with hboot-1.56 (comes with Android 4.4.2)
- USB debugging should be enabled
- Get temproot from the Firewater folks (based on code by hikezoe and fi01)
- Get the SuperSU or SuperUser APK (I got it from inside this zip): http://download.chainfire.eu/396/Sup...erSU-v1.94.zip
- Get a `su` executable (also inside the same zip): http://download.chainfire.eu/396/Sup...erSU-v1.94.zip
- full-system-temproot.zip from this post and unzip the two files
- The Firewater folks recommend disabling screen lock and rebooting.
- Put SuperSU.apk, su, busybox, and root.sh into /sdcard/Download
- Connect to USB and run:
adb shell sh /sdcard/Download/root.sh
Note: the difference between this and the "naked" temproot hack is that the naked hack leaves you with a root shell which can run root commands, but no way for installed programs to use root capabilities. Either way, rebooting will unroot the device. (There are still some root-related files, but they are inactive and will disappear when the device is factory reset.)
This has had minimal testing, but there is nothing that seems like it could cause obvious harm. It's a privilege escalation exploit, not a system change.