DirtyCow Test

adds08

Senior Member
Jun 15, 2013
202
94
0
kathmandu
Even if we get a root shell, there will be no SuperSu or TWRP unless we get an unlocked bootloader. The goal is to get a root shell so we can work on getting an unlocked bootloader through a root shell and/or I can pull the system.img and make a custom system like with the G4. Just letting everyone know so I can stop getting all of these PMs asking "WHEN WILL I HAVE ROOT WHAT'S THE ETA ON SUPERSU GIVE ME ROOT"
U do realize that jist modifying the system img and injecting it with root is not enough due to strict kernel policy.. Plus if system img injection could root i am pretty sure someone would have extracted the image and injected it with root...so thats that..
Also having root will not by any means ease with bootloader unlock...
And abt supersu ..if true rootbis achieved then it will come..

Anyways dirtycow need alot of other exploits in MM bl-locked i guess .. In other phones with <MM and bootlocked it is feasible.
 

Sergykm

Senior Member
Nov 1, 2012
511
182
73
32
Rivne
Even if we get a root shell, there will be no SuperSu or TWRP unless we get an unlocked bootloader. The goal is to get a root shell so we can work on getting an unlocked bootloader through a root shell and/or I can pull the system.img and make a custom system like with the G4. Just letting everyone know so I can stop getting all of these PMs asking "WHEN WILL I HAVE ROOT WHAT'S THE ETA ON SUPERSU GIVE ME ROOT"
thanks for explain, but I read one interesting new http://www.xda-developers.com/verizon-pixelpixel-xl-bootloader-unlock-has-been-released/
How they can did bootloader exploit? Maybe they can help us for unlock bootloader for our phone?
I don't know, this just an interesting info for me.
Sorry, for the trouble.

Sent from my LG-H850 using XDA-Developers mobile app
 

adds08

Senior Member
Jun 15, 2013
202
94
0
kathmandu
thanks for explain, but I read one interesting new http://www.xda-developers.com/verizon-pixelpixel-xl-bootloader-unlock-has-been-released/
How they can did bootloader exploit? Maybe they can help us for unlock bootloader for our phone?
I don't know, this just an interesting info for me.
Sorry, for the trouble.

Sent from my LG-H850 using XDA-Developers mobile app
Different bootloader ..
And as per my knowing some people involved in that have contributed hugely to LG phones and are now no more interested LG bcuz of some thieves who are wanabe hackers..
Sad..
 
  • Like
Reactions: Killua96 and gurbe

adds08

Senior Member
Jun 15, 2013
202
94
0
kathmandu
Let's give it up for @jcadduono!!! This works for the LG V20 but in theory should work for all devices if built the correct way. I don't know if this will mess up a non-bootloader unlocked phone so I recommend trying this on a T-Mobile device first...

http://forum.xda-developers.com/v20/development/h918-recowvery-unlock-v20-root-shell-t3490594
Honestly annoying...
It is just a root shell for bootloader unlocked device.. Not even supersu is present at the moment.. He is working on twrp for unlocked device..
 

YassGo

Senior Member
Mar 4, 2014
483
138
73
Paris
Let's give it up for @jcadduono!!! This works for the LG V20 but in theory should work for all devices if built the correct way. I don't know if this will mess up a non-bootloader unlocked phone so I recommend trying this on a T-Mobile device first...

http://forum.xda-developers.com/v20/development/h918-recowvery-unlock-v20-root-shell-t3490594
I've just tried all the Commands on a H860 and we can have a root shell :)
Now we must find out how we can root this phone (even without TWRP) and so we can use Flash Fire...
@Honestly Annoying : Can someone from the V20 thread can help us ? We seem so close ! :p
 
  • Like
Reactions: maksover

Veliion

Senior Member
Sep 18, 2013
426
97
0
Honestly annoying...
It is just a root shell for bootloader unlocked device.. Not even supersu is present at the moment.. He is working on twrp for unlocked device..
Maybe I'm reading this wrong but it gives you instructions on how to unlock the bootloader through ADB
 

Rayman31

New member
Feb 14, 2015
3
1
0
H831 (Canadian Variant)

Sorry m8,

When trying to use the command, "adb reboot bootloader" on a H831 (Canadian Variant), it only reboots the device. Can't unlock bootloader, thus can't run exploit...

ADB does recognize the phone under the command, "adb devices" however fastboot/bootloader appears to be locked down here. And yes, under developer options the "Enable OEM unlock" option is selected. Nice to hear other variants can run the exploit but for us lonely Canadians, our first step is to unlock the bootloader lol.
 

Nathamio

Senior Member
Nov 19, 2014
59
24
0
Charlotte
Game Plan:
Use this to get elevated privileges to enable booting into bootloader.
Use dirty cow recovery exploit.
BAMBAM
I will poke all the ****ing buttons on my phone and if it breaks I'll get another (insurance :3) @Honestly Annoying if you have anything you need tested I'm your man!
 
Last edited:
  • Like
Reactions: dannyboyex

Nathamio

Senior Member
Nov 19, 2014
59
24
0
Charlotte
Someone please test this. I can't right now (at work, don't have G5) so please update me. It works on my HTC 10 but I do not know if it will work on the G5...

CODE:

adb push arm64-v8a/dirtycow /data/local/tmp
adb push arm64-v8a/run-as /data/local/tmp
adb shell 'chmod 777 /data/local/tmp/run-as'
adb shell 'chmod 777 /data/local/tmp/dirtycow'
adb shell '/data/local/tmp/dirtycow /system/bin/run-as /data/local/tmp/run-as'
adb shell /system/bin/run-as
I'm currently using this to manipulate ALL KINDS of files on this phone. You can replace pretty much any file with something else, might be able to trick it into thinking it's a different model and letting me OEM unlock :3
 

Sergykm

Senior Member
Nov 1, 2012
511
182
73
32
Rivne
I'm currently using this to manipulate ALL KINDS of files on this phone. You can replace pretty much any file with something else, might be able to trick it into thinking it's a different model and letting me OEM unlock :3
can you edit build.prop or replace any file? Is it really work?
 
  • Like
Reactions: peerpower

Nathamio

Senior Member
Nov 19, 2014
59
24
0
Charlotte
Okay so, we need to replace the file /sys/fs/selinux/enforce with a version where the "1" is set to "0". we can't do that with dirtycow because we don't have read access. If we can modify a script that is run with permissions automatically by the android OS, we can have that script change the value, which will disable selinux and allow us to use dirtycow to enter a root shell! Then we can use said root shell to find an exploit to unlock the bootloader, and by seeing how hard it is to get around selinux, I can't imagine flipping some switch in some file to enable oem unlocking will be too hard.
 
Jan 30, 2014
20
2
0
I'm currently using this to manipulate ALL KINDS of files on this phone. You can replace pretty much any file with something else, might be able to trick it into thinking it's a different model and letting me OEM unlock :3
When I try this I get permission denied. "failed to copy 'dirtycow' to '/data/local/temp': Permission denied"

I am trying to modify files and folders on my phone that are locked. this is all. 20$ thru to whoever can help me accomplish root level browsing, and deletion of files and folders using this method. (preferably using windows or a shell on the g5 as I always have access to these.)

what is the arm64-v8a is it significant that the files come from this folder?

Please be patient. I am a novice. but I'm a novice with 20$ to the guy who helps me.
 

Attachments

Last edited:
  • Like
Reactions: peerpower
Jan 30, 2014
20
2
0
When I try this I get permission denied. "failed to copy 'dirtycow' to '/data/local/temp': Permission denied"

I am trying to modify files and folders on my phone that are locked. this is all. 20$ thru to whoever can help me accomplish root level browsing, and deletion of files and folders using this method. (preferably using windows or a shell on the g5 as I always have access to these.)

what is the arm64-v8a is it significant that the files come from this folder?

Please be patient. I am a novice. but I'm a novice with 20$ to the guy who helps me.
I can push the runas file but not dirtycow. why? (i tried just pushing run-as...corrected the command from the above post image to not be from the arm64-v8a directory)
 
Last edited:
  • Like
Reactions: peerpower