Revolutionary - zergRush local root 2.2/2.3 [22-10: Samsung/SE update]

Search This thread

paxChristos

Retired Forum Moderator
Aug 27, 2011
2,032
1,779
37
West Bend
If you see this:

---------------------------------------------------------------
Easy rooting toolkit (v2.0)
created by DooMLoRD
using exploit zergRush (Revolutionary Team)
Credits go to all those involved in making this possible!
---------------------------------------------------------------

[*] This script will:
(1) root ur device using latest zergRush exploit (10 Nov)
(2) install Busybox (1.18.4)
(3) install SU files (binary: 3.0.3 and apk: 3.0.6)

[*] Before u begin:
(1) make sure u have installed adb drivers for ur device
(2) enable "USB DEBUGGING"
from (Menu\Settings\Applications\Development)
(3) enable "UNKNOWN SOURCES"
from (Menu\Settings\Applications)
(4) [OPTIONAL] increase screen timeout to 10 minutes
(5) connect USB cable to PHONE and then connect to PC
(6) skip "PC Companion Software" prompt on device
---------------------------------------------------------------
CONFIRM ALL THE ABOVE THEN
Press any key to continue . . .
--- STARTING ----
--- WAITING FOR DEVICE
--- cleaning
rm failed for *, No such file or directory
--- pushing zergRush"
1441 KB/s (23056 bytes in 0.015s)
--- correcting permissions
--- executing zergRush

[**] Zerg rush - Android 2.2/2.3 local root
[**] (C) 2011 Revolutionary. All rights reserved.

[**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew.

[+] Found a GingerBread ! 0x0002a118
[*] Scooting ...
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 149 zerglings ...
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 189 zerglings ...
[-] Hellions with BLUE flames

The exploit has been patched.




Sent from my phone, please excuse any Swypos.
 

ClearD

Inactive Recognized Developer
Jan 10, 2009
3,261
1,445
37
Gallipolis
No. The zergrush exploit has been patched. Once an exploit is patched, it can no longer be used in any future Android version.

Sent using XDA-funded carrier pigeons
 

ClearD

Inactive Recognized Developer
Jan 10, 2009
3,261
1,445
37
Gallipolis
Zergrush is the name of this exploit. Zergrush will never work again. The team that created it may someday find a new one, but this thread needs to die.

Sent using XDA-funded carrier pigeons
 
  • Like
Reactions: paxChristos

oddoneout

Senior Member
Sep 15, 2012
351
78
Download is broken
 

Attachments

  • Untitled.jpg
    Untitled.jpg
    68.8 KB · Views: 534

Top Liked Posts

  • There are no posts matching your filters.
  • 87
    revolutionary-banner.png


    Hello!

    We would like to announce the public availability of the root exploit we use in Revolutionary, named zergRush.

    This local root exploit should be Android-wide, across Froyo (2.2) and Gingerbread (2.3). However, this will not work on Android Honeycomb and up (3.0+).

    Simultaneously, we're also releasing source code for this root exploit through our github.

    The binary is available from here: zergRush binary.

    The exploit source is available here: Revolutionary GitHub.

    Usage:

    You will need adb shell to execute this exploit. We need shell permissions.
    Push the binary onto /data/local/ and execute these commands in a shell:

    Code:
    $ chmod 755 /data/local/zergRush
    $ /data/local/zergRush

    The resulting output should look something like this:

    Code:
    [**] Zerg rush - Android 2.2/2.3 local root
    [**] (C) 2011 Revolutionary. All rights reserved.
    
    [**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew.
    
    [+] Found a GingerBread ! 0x00017118
    [*] Sending 149 zerglings ...
    [*] Trying a new path ...
    [*] Sending 149 zerglings ...
    [*] Trying a new path ...
    [*] Sending 149 zerglings ...
    [*] Trying a new path ...
    [*] Sending 149 zerglings ...
    [+] Zerglings caused crash (good news): 0x401219c4 0x0054
    [*] Researching Metabolic Boost ...
    [+] Speedlings on the go ! 0xafd260a9 0xafd39f9f
    [*] Poping 24 more zerglings
    [*] Sending 173 zerglings ...
    
    [+] Rush did it ! It's a GG, man !
    [+] Killing ADB and restarting as root..enjoy!

    *reconnect adb shell*

    Code:
    # id
    uid=0 gid=0

    That is all folks!

    Update 20-10-2011: zergRush has been updated to include some support for Sony Ericsson phones, updates for Samsung coming soon!
    Update 22-10-2011: updates for Samsung phones, get the new download (or build yourself)
    8
    I have tried the most recent zergRush on my Vizio VTAB 1008 running Gingerbread 2.3.2 and this exploit did not work. Here is the complete output which I ran in manual mode.

    $ ./zergRush

    [**] Zerg rush - Android 2.2/2.3 local root
    [**] (C) 2011 Revolutionary. All rights reserved.

    [**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew.

    [+] Found a GingerBread ! 0x00015118
    [*] Scooting ...
    [*] Sending 149 zerglings ...
    [+] Zerglings found a way to enter ! 0x10
    [+] Overseer found a path ! 0x000151e0
    [*] Sending 149 zerglings ...
    [+] Zerglings caused crash (good news): 0x40119cd4 0x0054
    [*] Researching Metabolic Boost ...
    [+] Speedlings on the go ! 0x8001a737 0x8003a4bf
    [*] Popping 24 more zerglings
    [*] Sending 173 zerglings ...

    [-] Bad luck, our rush did not succeed :(

    I did notice that other earlier versions of zergRush had been tried on this tablet but none succeeded in rooting it.

    Is it possible to modify the exploit so that it could succeed on this device? Or is it possible that this vulnerability has been patched and will not succeed at all?

    Any help provided by anyone will be HUGELY appreciated. If this helps, I do have the Android source code installed and am able to compile this from source code as needed.

    All other exploits have failed on this tablet. I have tried rageagainsthecage, gingerbreak, etc. It is difficult to believe that Vizio has made such a secure tablet with no exploitable vulnerabilities.

    Thanks again... Getting desperate...

    New version updated to fix this problem, check the GIT ;)
    2
    Getting "[-] Cannot copy boomsh.: Permission denied" from the shell when attempting to run zergRush on HTC Amaze. This was the 2nd time running on this phone after a reboot. The 1st time was successful, however my wife pulled me away so I couldn't finish what I wanted to do with root. No, I'm not going to divorce her over this. :)

    Code:
    macpro:platform-tools $ /android/platform-tools/adb push /android/temp/zergRush /data/local/zergRush
    2076 KB/s (21215 bytes in 0.009s)
    macpro:platform-tools $ /android/platform-tools/adb shell
    $ chmod 755 /data/local/zergRush
    $ /data/local/zergRush
    
    [**] Zerg rush - Android 2.2/2.3 local root
    [**] (C) 2011 Revolutionary. All rights reserved.
    
    [**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew.
    
    [-] Cannot copy boomsh.: Permission denied
    $ macpro:platform-tools $

    You may need to create /data/local/tmp first.
    Also, if you've already ran this once, you might need to clean up this directory - remove boomsh/sh.
    2
    Anyone that might still find use in this exploit should have a look at DooMLoRD's Easy Rooting Toolkit which uses the zergRush exploit
    1
    Reboot?

    It worked in my HTC Chacha. Then I remounted System as rw. And then after a while(about 30 secs), my device reboots.
    I tried it twice, after deleting /data/local/tmp/*
    Is it normal? My device is S-ON.

    Edited: I found it, it is because I modified the system partition, because after reboot it was as before.
    Thank you.