i mean cmon there are pleanty of KITKAT 4.4.2 fastboot files.
i have tried pushing "su" maually with "pwn" exploit.
tried with following exploits
but no luck there.
any one pleaseeeee...im dieing here..
our system details.
- LOCKED BOOTLOADER ( )
- KIT KAT 4.4.2
- Blur_Version.183.46.10.XT907.Verizon.en.US ( KDA20.62-10.1 )
what i tried is
adb devices adb push pwn /data/local/tmp adb shell $ cd /data/local/tmp $ chmod 777 pwn $ ./pwn ( NO LUCK GETTING PERMISSION AFTER $ ./pwn ) At this point, the exploit will run and close the shell. You will need to run these commands to restart the ADB server. adb kill-server adb devices Now comes the moment of truth. Use the adb shell command to open a shell. If you see a "#" sign, you have root access, so go ahead and continue to the next part. If not, you can go back and try the previous steps again We now need to make this root permanent. From the root shell you just opened, type the following commands. # mount -o remount,rw -t rfs /dev/block/st19 /system # exit adb push busybox /system/bin adb push su /system/bin adb install Superuser.apk adb shell # chmod 4755 /system/bin/busybox # chmod 4755 /system/bin/su # mount -o remount,ro -t rfs /dev/block/st19 /system # exit adb reboot
gys lets make this happen any how.....lets roll...