UPDATE: It took on the 3rd try
I did not do step 15 as it was a bit confusing. Will that be/become an issue?
I just got a few HD 10's 64GB the other day on 5.6.1.0 March 22, 2018
My system:
Windows 10 64-Bit
Files on my C: Drive C:\ADB platform-tools
C directory on the root C: drive and also in the ADB folder C:\ADB platform-tools\c
Also my C directory has additional files not listed and zip file. I deleted those and had just the 12 files mentioned plus the supersu.apk
OK finally got it working but it seems to fail at step 8
here is a dump of what is going on
All help appreciated
c:\ADB platform-tools>adb shell
[email protected]:/ $ cp /sdcard/c/* /data/local/tmp
[email protected]:/ $ cd /data/local/tmp
[email protected]:/data/local/tmp $ ls -l
-rw-rw---- shell shell 109400 2018-12-05 21:45 Matrix
-rw-rw---- shell shell 67 2018-12-05 21:45 ddexe
-rw-rw---- shell shell 1756 2018-12-05 21:45 debuggerd
-rw-rw---- shell shell 202824 2018-12-05 21:45 fileWork
-rw-rw---- shell shell 629 2018-12-05 21:45 install-recovery.sh
-rw-rw---- shell shell 13592 2018-12-05 21:45 pidof
-rw-rw---- shell shell 1912 2018-12-05 21:45 start_wssud.sh
-rw-rw---- shell shell 75348 2018-12-05 21:45 su
-rw-rw---- shell shell 108480 2018-12-05 21:45 su_arm64
-rw-rw---- shell shell 6258692 2018-12-05 21:45 supersu_2.82.1.apk
-rw-rw---- shell shell 101852 2018-12-05 21:45 supolicy
-rw-rw---- shell shell 177316 2018-12-05 21:45 toolbox
-rw-rw---- shell shell 38830 2018-12-05 21:45 wsroot.sh
[email protected]:/data/local/tmp $ chmod 755 *
[email protected]:/data/local/tmp $ ./Matrix /data/local/tmp 2
<WSRoot><Command>0</Command></WSRoot>
<WSRoot><InitResource>0</InitResource></WSRoot>
Decrypt Success: /data/local/tmp/fileWork
Output File Name: /data/local/tmp/fileWork.
<WSRoot><Decrypt>0</Decrypt></WSRoot>
extracting: /data/local/tmp/Bridge_wsroot.sh
extracting: /data/local/tmp/krdirtyCow32
extracting: /data/local/tmp/krdirtyCow64
extracting: /data/local/tmp/libsupol.so
extracting: /data/local/tmp/my.sh
extracting: /data/local/tmp/mysupolicy
extracting: /data/local/tmp/patch_script.sh
extracting: /data/local/tmp/root3
<WSRoot><Decompression>0</Decompression></WSRoot>
execute string: /data/local/tmp/root3 /data/local/tmp/ 2
WARNING: linker: /data/local/tmp/root3: unused DT entry: type 0x6ffffffe arg 0x600
WARNING: linker: /data/local/tmp/root3: unused DT entry: type 0x6fffffff arg 0x1
ro.build.version.sdk :22
ro.product.cpu.abi :arm64-v8a
is x64
execute string: /data/local/tmp/krdirtyCow64 /data/local/tmp/ 2
WARNING: linker: /data/local/tmp/krdirtyCow64: unused DT entry: type 0x6ffffffe arg 0xd30
WARNING: linker: /data/local/tmp/krdirtyCow64: unused DT entry: type 0x6fffffff arg 0x1
path : /data/local/tmp/
path : /data/local/tmp
[*] path_script:/data/local/tmp/patch_script.sh /data/local/tmp
rm: /data/local/tmp/sepolicy: No such file or directory
rm: /data/local/tmp/load: No such file or directory
supolicy v2.76 (ndk:armeabi) - Copyright (C) 2014-2016 - Chainfire
Patching policy [/data/local/tmp/sepolicy] --> [/data/local/tmp/load] ...
-permissive:zygote=ok
-permissive:kernel=ok
-permissive:init=ok
-permissive:su=ok
-permissive:init_shell=ok
-permissive:shell=ok
-permissive:servicemanager=ok
- Success
find_opcode offset:2d0 opcode:aaffbbee
find ok star:7fa036a008 end:7fa036a2d8 size:2d0
sh : /data/local/tmp/my.sh /data/local/tmp 2 fwrite is count 211040 /data/local/tmp/load1
fwrite is count 54324 /data/local/tmp/load2
find_opcode offset:2b4 opcode:eaeaeaea
find_opcode offset:2b8 opcode:ebebebeb
find_opcode offset:22d opcode:abababab
load = 40c94 load1 = 33860 load2 = d434
find_opcode offset:2b0 opcode:efefefef
find_opcode offset:24d opcode:cdcdcdcd
find_opcode offset:2bc opcode:acacacac
init_shellcode
loadsize:265364
loadpath:/data/local/tmp/load
shpath:/data/local/tmp/my.sh /data/local/tmp 2
shpath:2bc
open /proc
PID:204
find logd pid : cc
_inject_start_s:0x7fa036a008
Copying /sepolicy to /data/local/tmp/cp_sepolicy
cow_exploit_mv_file_init: Overriding /sepolicy from /data/local/tmp/load1
size: 211040
[*] mmap 0x7fa0163000;
[*] exploit (patch)
[*] currently 0x7fa0163000=8f97cff8c
sched_setaffinity: Function not implemented[*] madvise = 0x7fa0163000 211040
checking the patch ... exploit
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
exit fork(), loop time more then 30s
<WSRoot><Exploit>0x00000332</Exploit></WSRoot>
check done
sched_setaffinity: Function not implemented<WSRoot><Exploit>0x00000382</Exploit></WSRoot>
FAIL : load1 --> /sepolicy
<WSRoot><Exploit>0x00000341</Exploit></WSRoot>
Tried this and at step 6. I get ERRORS
cp /sdcard/c/* /data/local/tmp
ERROR: 'cp' is not recognized as an internal or external command, operable program or batch file.
Changing CP to COPY
copy /sdcard/c/* /data/local/tmp
ERROR: The syntax of the command is incorrect.
Windows 10 64-Bit
Files on my C: Drive C:\ADB platform-tools
C directory on the root C: drive and also in the ADB folder C:\ADB platform-tools\c
OK I see I missed step 5. Typed adb shell into the cmd window and got 127|[email protected]:/ $
Not really understanding "You should enter the tablet as a user." How do I do this?
proceeding to step 6 I now get the following ERRORS
127|[email protected]:/ $ cp /sdcard/c/* /data/local/tmp
cp: /sdcard/c/*: No such file or directory
1|[email protected]:/ $
Hello ....
Step #6 in OP says:
But I have no /sdcard folder that I can see on my Fire to copy the files to. Isnt the /sdcard folder in the root folder along with stuff like /acct /data /root /sbin /mnt ect.....?
I guess my question is How do I copy files from PC to the Fire's Internal Storage at /sdcard which is in the root folder but I dont have root yet ..??
Thank you
============================
UPDATE: NM, I figured it out myself and now have fully rooted Kindle.
Cheers
I got the special exploited message in the shell and SU succeeded . I granted SU default.
But:
10|[email protected]:/data/data-lib $ rm -r com.wondershare.DashRoot
override rwxrwxrwx root:root for 'com.wondershare.DashRoot'? yes
rm: com.wondershare.DashRoot: Permission denied
any help will be appriciated
Don't try this method. Try this, is more easy:
https://forum.xda-developers.com/hd...xperimental-software-root-hd-8-hd-10-t3904595
Hello ....
Step #6 in OP says:
But I have no /sdcard folder that I can see on my Fire to copy the files to. Isnt the /sdcard folder in the root folder along with stuff like /acct /data /root /sbin /mnt ect.....?
I guess my question is How do I copy files from PC to the Fire's Internal Storage at /sdcard which is in the root folder but I dont have root yet ..??
Thank you
============================
UPDATE: NM, I figured it out myself and now have fully rooted Kindle.
Cheers
cp /sdcard/c/* /data/local/tmp
cd /data/local/tmp
ls -l
chmod 755 *
./Matrix /data/local/tmp 2
[*] exploited 0x7f83021000=f97cff8c
end!!!!!!!
<WSRoot><Exploit>0</Exploit></WSRoot>
<WSRoot><Done>0</Done></WSRoot>
[email protected]:/data/local/tmp $ ./Matrix /data/local/tmp 2
<WSRoot><Command>0</Command></WSRoot>
<WSRoot><InitResource>0</InitResource></WSRoot>
Decrypt Success: /data/local/tmp/fileWork
Output File Name: /data/local/tmp/fileWork.
<WSRoot><Decrypt>0</Decrypt></WSRoot>
extracting: /data/local/tmp/Bridge_wsroot.sh
extracting: /data/local/tmp/krdirtyCow32
extracting: /data/local/tmp/krdirtyCow64
extracting: /data/local/tmp/libsupol.so
extracting: /data/local/tmp/my.sh
extracting: /data/local/tmp/mysupolicy
extracting: /data/local/tmp/patch_script.sh
extracting: /data/local/tmp/root3
<WSRoot><Decompression>0</Decompression></WSRoot>
execute string: /data/local/tmp/root3 /data/local/tmp/ 2
WARNING: linker: /data/local/tmp/root3: unused DT entry: type 0x6ffffffe arg 0x600
WARNING: linker: /data/local/tmp/root3: unused DT entry: type 0x6fffffff arg 0x1
ro.build.version.sdk :22
ro.product.cpu.abi :arm64-v8a
is x64
execute string: /data/local/tmp/krdirtyCow64 /data/local/tmp/ 2
WARNING: linker: /data/local/tmp/krdirtyCow64: unused DT entry: type 0x6ffffffe arg 0xd30
WARNING: linker: /data/local/tmp/krdirtyCow64: unused DT entry: type 0x6fffffff arg 0x1
path : /data/local/tmp/
path : /data/local/tmp
[*] path_script:/data/local/tmp/patch_script.sh /data/local/tmp
rm: /data/local/tmp/sepolicy: No such file or directory
rm: /data/local/tmp/load: No such file or directory
supolicy v2.76 (ndk:armeabi) - Copyright (C) 2014-2016 - Chainfire
Patching policy [/data/local/tmp/sepolicy] --> [/data/local/tmp/load] ...
-permissive:zygote=ok
-permissive:kernel=ok
-permissive:init=ok
-permissive:su=ok
-permissive:init_shell=ok
-permissive:shell=ok
-permissive:servicemanager=ok
- Success
find_opcode offset:2d0 opcode:aaffbbee
find ok star:7f8325c008 end:7f8325c2d8 size:2d0
sh : /data/local/tmp/my.sh /data/local/tmp 2 fwrite is count 210148 /data/local/tmp/load1
fwrite is count 54204 /data/local/tmp/load2
find_opcode offset:2b4 opcode:eaeaeaea
find_opcode offset:2b8 opcode:ebebebeb
find_opcode offset:22d opcode:abababab
load = 408a0 load1 = 334e4 load2 = d3bc
find_opcode offset:2b0 opcode:efefefef
find_opcode offset:24d opcode:cdcdcdcd
find_opcode offset:2bc opcode:acacacac
init_shellcode
loadsize:264352
loadpath:/data/local/tmp/load
shpath:/data/local/tmp/my.sh /data/local/tmp 2
shpath:2bc
open /proc
PID:208
find logd pid : d0
_inject_start_s:0x7f8325c008
Copying /sepolicy to /data/local/tmp/cp_sepolicy
cow_exploit_mv_file_init: Overriding /sepolicy from /data/local/tmp/load1
size: 210148
[*] mmap 0x7f83055000;
[*] exploit (patch)
[*] currently 0x7f83055000=8f97cff8c
sched_setaffinity: Function not implemented[*] madvise = 0x7f83055000 210148
checking the patch ... exploit
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
check done
sched_setaffinity: Function not implementedmadviseThread() done
procselfmemThread() done
[*] exploited 0x7f83055000=f97cff8c
[main]p_vdso_addr:0x7f8325a000 p_vdso_buffer:0x400000
[*]set_ret_jmp
[*]set_ret_jmp 400410
[*]set_ret_jmp 400420
[main] write 1
Parent is over..status == 0
socket: No such file or directory
socket = 7
ret = ffffffff
connect
: No such file or directory
ret = ffffffff
find coe f
[main] write 2
Parent is over..status == 0
cow_exploit_mv_file_init: Overriding /sepolicy from /data/local/tmp/load2
warning: new file size (54204) and file old size (210148) differ
size: 54204
[*] mmap 0x7f83236000;
[*] exploit (patch)
[*] currently 0x7f83236000=8f97cff8c
sched_setaffinity: Function not implemented[*] madvise = 0x7f83236000 54204
checking the patch ... exploit
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
check done
sched_setaffinity: Function not implementedmadviseThread() done
procselfmemThread() done
[*] exploited 0x7f83236000=8600a5
find coe 36
Parent is over..status == 0
cow_exploit_mv_file_init: Overriding /sepolicy from /data/local/tmp/cp_sepolicy
size: 210148
[*] mmap 0x7f83021000;
[*] exploit (patch)
[*] currently 0x7f83021000=10007008600a5
checking the patch ... exploit
sleep 1s
sched_setaffinity: Function not implementedsched_setaffinity: Function not implemented[*] madvise = 0x7f83021000 210148
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
sleep 1s
check done
madviseThread() done
procselfmemThread() done
[*] exploited 0x7f83021000=f97cff8c
end!!!!!!!
<WSRoot><Exploit>0</Exploit></WSRoot>
<WSRoot><Done>0</Done></WSRoot>
su
cd /data/data-lib
rm -r com.wondershare.DashRoot
rm -r wondershare
su
mount -w -o remount /system
cp /sdcard/k/* /data/local/tmp/
cd /data/local/tmp
ls -l
chmod 755 *
./kingo
su
mount -w -o remount /system
What exploit did you use?
Tried the manual and Kingo method on 5.6.2.0, but still no root access for me![]()