[HOW-TO] Root FRGxx builds without unlocking bootloader

Search This thread

W3ber

Member
Feb 16, 2010
21
0
Justify

I root rage exploit.
I install amon ra 2.0(Just question i use permanently?stock 2.2.1FRG83D
i do nandbackup :)
And everything fine.Install costum rom if i want.
I have ability to use fasboot?withour unlock bootloader
 

Top Liked Posts

  • There are no posts matching your filters.
  • 1
    Thanks to efrant for pointing the way to this guide. Based on comments below, I'm quoting another revised version.

    Hi OP,
    You may want to edit your post #2, I have inserted the mounting commands in the thread i posted previously. this will help novice users to get thing right out of box without figuring why permission denied.
    I have just tried out the additional mounting steps..things are working fine..

    Tidy up step by step rooting

    1) Getting rageagainstthecage-arm5.bin
    http://stealth.openwall.net/xSports/RageAgainstTheCage.tgz

    2) Getting Superuser.apk, busybox,su
    http://xdaforums.com/showthread.php?t=736271
    Or
    Find yourself..there are many floating around.

    3) Rooting Process (Installing custom Recovery rom section is deleted to simplify illustration
    Reference:http://xdaforums.com/showpost.php?p=8120790&postcount=250

    Code:
    F:\ADB>adb push rageagainstthecage-arm5.bin /data/local/tmp/rageagainstthecage
    263 KB/s (5392 bytes in 0.020s)
    
    F:\ADB>adb shell chmod 700 /data/local/tmp/rageagainstthecage
    
    F:\ADB>adb shell
    $ cd /data/local/tmp
    cd /data/local/tmp
    $ ./rageagainstthecage
    ./rageagainstthecage
    [*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
    [*] checking NPROC limit ...
    [+] RLIMIT_NPROC={3084, 3084}
    [*] Searching for adb ...
    [+] Found adb as PID 64
    [*] Spawning children. Dont type anything and wait for reset!
    [*]
    [*] If you like what we are doing you can send us PayPal money to
    [*] 7-4-3-C[at]web.de so we can compensate time, effort and HW costs.
    [*] If you are a company and feel like you profit from our work,
    [*] we also accept donations > 1000 USD!
    [*]
    [*] adb connection will be reset. restart adb server on desktop and re-login.
    $
    F:\ADB>adb kill-server
    
    F:\ADB>adb start-server
    * daemon not running. starting it now *
    * daemon started successfully *
    
    F:\ADB>adb shell
    #mount -o remount,rw -t yaffs2 /dev/block/mtdblock3 /system 
    
    Follow the following steps to install Superuser.apk, busybox,su
    
    F:\ADB>adb shell
    # cd /data/local/tmp
    cd /data/local/tmp
    # ./busybox cp busybox /system/bin
    ./busybox cp busybox /system/bin
    # chmod 4755 /system/bin/busybox
    chmod 4755 /system/bin/busybox
    # busybox cp Superuser.apk /system/app
    busybox cp Superuser.apk /system/app
    # busybox cp su /system/bin
    busybox cp su /system/bin
    # chmod 4755 /system/bin/su
    chmod 4755 /system/bin/su
    # exit
    exit
    
    F:\ADB>adb shell
    # su
    su
    #mount -o remount,ro -t yaffs2 /dev/block/mtdblock3 /system 
    # exit 
    exit


    And below are the previous contents of this post, prior to editing.
    -------------


    Many respondents on this thread have indicated that the instructions don't work the first time. If you get to the step where you are supposed to get a root shell (#) but you instead get a non-root shell ($), start from the top and try the exploit once or twice more. Apparently if you are persistent it will work.

    I'm also told these instructions are missing adb remount before the steps where you push busybox, su and so forth.

    Tidy up step by step rooting

    1) Getting rageagainstthecage-arm5.bin
    http://stealth.openwall.net/xSports/RageAgainstTheCage.tgz

    2) Getting Superuser.apk, busybox,su
    http://xdaforums.com/showthread.php?t=736271
    Or
    Find yourself..there are many floating around.

    3) Rooting Process (Installing custom Recovery rom section is deleted to simplify illustration
    Reference:http://xdaforums.com/showpost.php?p=8120790&postcount=250
    Code:
    F:\ADB>adb push rageagainstthecage-arm5.bin /data/local/tmp/rageagainstthecage
    263 KB/s (5392 bytes in 0.020s)
    
    F:\ADB>adb shell chmod 700 /data/local/tmp/rageagainstthecage
    
    F:\ADB>adb shell
    $ cd /data/local/tmp
    cd /data/local/tmp
    $ ./rageagainstthecage
    ./rageagainstthecage
    [*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
    [*] checking NPROC limit ...
    [+] RLIMIT_NPROC={3084, 3084}
    [*] Searching for adb ...
    [+] Found adb as PID 64
    [*] Spawning children. Dont type anything and wait for reset!
    [*]
    [*] If you like what we are doing you can send us PayPal money to
    [*] 7-4-3-C[at]web.de so we can compensate time, effort and HW costs.
    [*] If you are a company and feel like you profit from our work,
    [*] we also accept donations > 1000 USD!
    [*]
    [*] adb connection will be reset. restart adb server on desktop and re-login.
    $
    F:\ADB>adb kill-server
    
    F:\ADB>adb start-server
    * daemon not running. starting it now *
    * daemon started successfully *
    
    F:\ADB>adb shell
    #
    
    Follow the following steps to install Superuser.apk, busybox,su
    
    F:\ADB>adb shell
    # cd /data/local/tmp
    cd /data/local/tmp
    # ./busybox cp busybox /system/bin
    ./busybox cp busybox /system/bin
    # chmod 4755 /system/bin/busybox
    chmod 4755 /system/bin/busybox
    # busybox cp Superuser.apk /system/app
    busybox cp Superuser.apk /system/app
    # busybox cp su /system/bin
    busybox cp su /system/bin
    # chmod 4755 /system/bin/su
    chmod 4755 /system/bin/su
    # exit
    exit
    
    F:\ADB>adb shell
    # su
    su
    # exit 
    exit
    1
    There is detailed step-by-step info in many threads as to how to use the rageagainstthecage exploit to root your device, e.g.: http://xdaforums.com/showpost.php?p=8300203&postcount=55

    Why start a new thread?