[Q] How Root Toshiba Excite Pro AT10LE-A-108

YuriRM

Senior Member
Dec 17, 2015
851
217
0
A scatter file of Toshiba Excite Pro is easy to create using the new partitions table.

Check how to retrieve more info on partitions and other missing components of Toshiba Excite Pro using the new version 4.9.4 of Device Info HW, please. The new apk is attached at the end of post #1.
https://forum.xda-developers.com/android/apps-games/app-device-info-hw-t3558335

I do not know how to take a Screenshot of the new Partitions table.
 
Last edited:

YuriRM

Senior Member
Dec 17, 2015
851
217
0
Universal Coolpad Toolkit for Toshiba Excite Pro

@[email protected] can you create a scatter file for my tablet Toshiba Excite Pro AT10LE-A-109, please? The SoC is a Nvidia Tegra 4.

Screenshots of the Partitions by Device Info HW are great for scatter files.

According to Nexus 7 development thread, these are common names of Partitions on Tegra tablets:

APP -> system
CAC -> cache
LNX -> boot
MDA -> encrypted userdata
MSC -> misc
PER -> per device calibration
SOS -> recovery
UDA -> userdata
USP -> bootloader

The stock recovery (SOS partition), traditional partition info and partition labels are also available in this post by @Rafostar
https://forum.xda-developers.com/showpost.php?p=74227484&postcount=39

A TWRP Recovery is needed too. However, there is only a temporary root by KingoRoot.

KP, your scripting skills are crucial to perform BootStomp, an automated tool to find bugs in Android bootloaders. Can you help us on that task, please?

We would like to add this device to your Universal Coolpad Toolkit. Does it support a Nvidia Tegra 4 SoC ? Should a customised version be prepared with your open source code, instead?
https://coolpadtoolkit.wordpress.com/

Sent from my takee 1 using XDA Labs
 

Attachments

Last edited:
  • Like
Reactions: [email protected]

[email protected]

Senior Member
Apr 21, 2016
285
238
0
Mumbai
kpstvhub.com
@[email protected] can you create a scatter file for my tablet Toshiba Excite Pro AT10LE-A-109, please? The SoC is a Nvidia Tegra 4.

Screenshots of the Partitions by Device Info HW are great for scatter files.

According to Nexus 7 development thread, these are common names of Partitions on Tegra tablets:

APP -> system
CAC -> cache
LNX -> boot
MDA -> encrypted userdata
MSC -> misc
PER -> per device calibration
SOS -> recovery
UDA -> userdata
USP -> bootloader

The stock recovery (SOS partition), traditional partition info and partition labels are also available in this post by @Rafostar
https://forum.xda-developers.com/showpost.php?p=74227484&postcount=39

A TWRP Recovery is needed too. However, there is only a temporary root by KingoRoot.

KP, your scripting skills are crucial to perform BootStomp, an automated tool to find bugs in Android bootloaders. Can you help us on that task, please?

We would like to add this device to your Universal Coolpad Toolkit. Does it support a Nvidia Tegra 4 SoC ? Should a customised version be prepared with your open source code, instead?
https://coolpadtoolkit.wordpress.com/
I will add this device also and will definitely create a twrp for it and for scatter file you did it perfect listing partitions. Do one thing in Device Info HW app tap the 3 dots on top right then select info center. From there Create a Report. It will create an html file containing all information about your device PM me that file :angel:

Edit: Yes you can prepare you own Toolkit from my coolpad source code.
 
Last edited:
  • Like
Reactions: YuriRM

YuriRM

Senior Member
Dec 17, 2015
851
217
0
@[email protected] can you master the python scripts of BootStomp?

Bootloader vulnerabilities on all android devices can be explored by BootStomp automated tool.

Are you willing to try BootStomp on your device to learn how to use it? Then you may be able to help defeat Toshiba's Sealime protection and unlock the bootloader of Toshiba Excite Pro.

BootStomp: a bootloader vulnerability finder.
https://github.com/ucsb-seclab/BootStomp

Nexus 9 (Nvidia Tegra K1) bootloader vulnerabilities:
https://github.com/ucsb-seclab/BootStomp/tree/master/bootloaders/nexus_9

Huawei P8, Nexus 9, Qualcomm Little Kernel and Sony Xperia XA, bootloader vulnerabilities
https://github.com/ucsb-seclab/BootStomp/tree/master/bootloaders

DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers
https://github.com/ucsb-seclab/dr_checker

EDIT - The first person of the XDA forum running a state of the art security tool to defeat famous protection mechanisms of Toshiba, ZTE, iRULU, etc. will get noticed and bask in glory. Being so young is a bonus. Google will want to hire you!
 
Last edited:
  • Like
Reactions: [email protected]

[email protected]

Senior Member
Apr 21, 2016
285
238
0
Mumbai
kpstvhub.com
@[email protected] can you master the python scripts of BootStomp?

Bootloader vulnerabilities on all android devices can be explored by BootStomp automated tool.

Are you willing to try BootStomp on your device to learn how to use it? Then you may be able to help defeat Toshiba's Sealime protection and unlock the bootloader of Toshiba Excite Pro.

BootStomp: a bootloader vulnerability finder.
https://github.com/ucsb-seclab/BootStomp

Nexus 9 (Nvidia Tegra K1) bootloader vulnerabilities:
https://github.com/ucsb-seclab/BootStomp/tree/master/bootloaders/nexus_9

Huawei P8, Nexus 9, Qualcomm Little Kernel and Sony Xperia XA, bootloader vulnerabilities
https://github.com/ucsb-seclab/BootStomp/tree/master/bootloaders

DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers
https://github.com/ucsb-seclab/dr_checker

EDIT - The first person of the XDA forum running a state of the art security tool to defeat famous protection mechanisms of Toshiba, ZTE, iRULU, etc. will get noticed and bask in glory. Being so young is a bonus. Google will want to hire you!

Even I want to work hard on such project but have to wait till 13th May since Semesters are going in my high school will end up on 13th May after that full focus on on this!
 

YuriRM

Senior Member
Dec 17, 2015
851
217
0
Last edited:
  • Like
Reactions: [email protected]

YuriRM

Senior Member
Dec 17, 2015
851
217
0
hello i need firmware for excite pure at10-a-104
my tablet stuck at boot screen . i need this firmware to upgrade it from sd card
Toshiba Excite 10 AT305 is a clone of your Toshiba Excite Pure AT10-A-104. Both have an Nvidia Tegra 3.

You may ask in this thread:
https://forum.xda-developers.com/showthread.php?t=1661171&page=16

All Toshiba devices are protected by variants of the Sealime module. It prevents the unlocking of the bootloader.

A KingoRoot app from September 2017 was able to obtain temporary root on two Toshiba Excite Pro devices with Nvidia Tegra 4.

You may try KingoRoot on your device too!

Sent from my takee 1 using XDA Labs
 
  • Like
Reactions: stelioskoz

raven008

New member
Jul 13, 2018
1
0
0
Any good news? Or it's over now?


Toshiba Excite 10 AT305 is a clone of your Toshiba Excite Pure AT10-A-104. Both have an Nvidia Tegra 3.

You may ask in this thread:
https://forum.xda-developers.com/showthread.php?t=1661171&page=16

All Toshiba devices are protected by variants of the Sealime module. It prevents the unlocking of the bootloader.

A KingoRoot app from September 2017 was able to obtain temporary root on two Toshiba Excite Pro devices with Nvidia Tegra 4.

You may try KingoRoot on your device too!

Sent from my takee 1 using XDA Labs
 
Last edited:

suethon

New member
Dec 9, 2018
1
1
0
can I help?

Hi all,
I got a Toshiba Excite Write AT10PE-A105. As far as I see, the only difference to your LE is the screen, which has different (corning) glass and a stylus and the extended Memory of 32GB. However I am desperately looking for a newer ROM since the latest Toshiba android is 4.3 which is no longer supported by apps, which I would like to use.
Unfortunately I do not understand most of your discussion but with your help I might be able to contribute with information on my version of that hardware?

Peter
 
  • Like
Reactions: YuriRM

YuriRM

Senior Member
Dec 17, 2015
851
217
0
Can you master the python scripts of BootStomp?

@Mich-C can you master the python scripts of BootStomp?

Bootloader vulnerabilities on all android devices can be explored by BootStomp automated tool.

Are you willing to try BootStomp on your device to learn how to use it? Then you may be able to help defeat Toshiba's Sealime protection and unlock the bootloader of Toshiba Excite Pro (AT10LE-A-108 and AT10LE-A-109) and Toshiba Excite Write (AT10PE-A105). These are very expensive tablets with Nvidia Tegra 4 (Wayne, tegraT114, board tostab12BA, Linux version 3.4.57-gc710e6f) running Android 4.3.

BootStomp: a bootloader vulnerability finder.
https://github.com/ucsb-seclab/BootStomp

Nexus 9 (Nvidia Tegra K1) bootloader vulnerabilities:
https://github.com/ucsb-seclab/BootStomp/tree/master/bootloaders/nexus_9

Huawei P8, Nexus 9, Qualcomm Little Kernel and Sony Xperia XA, bootloader vulnerabilities
https://github.com/ucsb-seclab/BootStomp/tree/master/bootloaders

Tegra X1 vulnerability found, affects the Google Pixel C and Nvidia Shield
https://www.xda-developers.com/nvidia-tegra-x1-google-pixel-c-nvidia-shield/

I bet this vulnerability was found with BootStomp. It is likely to exist in Tegra 4 too!

DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers
https://github.com/ucsb-seclab/dr_checker

EDIT - The first person of the XDA forum running a state of the art security tool to defeat famous protection mechanisms of Toshiba, ZTE, iRULU, etc. will get noticed and bask in glory. Being so young is a bonus. Google will want to hire you!
 
Last edited:
  • Like
Reactions: beholder21

YuriRM

Senior Member
Dec 17, 2015
851
217
0
BootStomp - 6 seeds and 1 sink reveals 12 Entry Points (Nvidia Tegra K1)

@Mich-C

BootStomp

A test on Nvidia Tegra K1 with 6 seeds and 1 sink reveals 12 Entry Points, performing 7 loops and returning 1 zero-day bug in under 25 minutes (see Table 2, eight attached images at the bottom, read the Redini PDF).

"The particular vulnerabilities found consisted mostly of memory corruption and privilege escalation bugs, including a part of NVIDIA’s bootloader code that could end up becoming user-accessible under the right OS conditions, as one example. Essentially, most of the vulnerabilities would either unlock the bootloader, preventing it from enforcing key security policies, or hand over control of key processes to the user privilege level. Tests were inconclusive on MediaTek hardware due to the bootloader’s unique structure, while an older Qualcomm bootloader fell victim to a known old bug, and the NVIDIA bootloader was only found to be vulnerable to the aforementioned privilege escalation bug. "

"NVIDIA’s Tegra-based devices ship with a bootloader known as hboot. This bootloader is very similar to Qualcomm’s, in that it runs at EL1, and implements only the fastboot functionality at this stage. BOOTSTOMP also discovered a vulnerability in NVIDIA’s hboot. hboot operates at EL1, meaning that it has equivalent privilege on the hardware as the Linux kernel, although it exists earlier in the Chain of Trust, and therefore its compromise can lead to an attacker gaining persistence. We have reported the vulnerability to NVIDIA, and we are working with them on a fix. Our tool did not identify any path to non-volatile storage for the NVIDIA’s or MediaTek’s bootloaders. Upon manual investigation, we discovered that these two bootloaders both make use of memory-mapped I/O to write the value, which could map to anything from the flash to special tamper-resistant hardware. Thus, we cannot exclude the presence of vulnerabilities."

https://forum.xda-developers.com/showpost.php?p=74517016&postcount=63

---------- Post added at 11:38 PM ---------- Previous post was at 11:25 PM ----------

Hi all,
I got a Toshiba Excite Write AT10PE-A105. As far as I see, the only difference to your LE is the screen, which has different (corning) glass and a stylus and the extended Memory of 32GB. However I am desperately looking for a newer ROM since the latest Toshiba android is 4.3 which is no longer supported by apps, which I would like to use.
Unfortunately I do not understand most of your discussion but with your help I might be able to contribute with information on my version of that hardware?

Peter
Thanks!
You must instal the latest version of Device Info HW app by Andrey Efremov (ANDR7E).
https://play.google.com/store/apps/details?id=ru.andr7e.deviceinfohw

Give us a screenshot of partitions with names, please.

Thanks for finding android roms that shouldn't be too hard to port to our device. But in our stock recovery there is no option to flash anything other than "update" that must be digitally signed otherwise it gets rejected (tried myself). So flashing even a patch to remove/modify sealime functionality is impossible afaik. We need to get rid of sealime for good some way or another, otherwise there is no point in porting roms that can't be flashed.

"Basically if sealime does NOT return null, the kernel proceeds." - if that is true then finding a way to edit part of memory that holds return value of sealime loading function would allow us to proceed with sealime turned off and do whatever we please. But we probably would need help as I can't handle this alone :(
Android version Kingo root did not give me the ability to root my tablet.
Only the PC version allows me to root my tablet.
Today i Uploaded the Device Information to the Device Info HW App (by Audrey Efremov) Database:)
The QV1030 Kernel was published on the Gigaset Webpage.
Please can someone give us the detailed tuto to install a new rom and root this tablet
Has anyone here obtained root on this device using kingoroot?
Any good news? Or it's over now?
Tried various methods today, sadly none of them worked for mine... shame toshiba locks it so damn hard!
@Mich-C is going to help us but he does not own this device. BootStomp is going to be tested on his android devices. Then he will write a script that could auto-diagnose the bootloader vulnerabilities of any device. Thereafter, we can test his script on Toshiba Excite Pro. This is a much needed first step to defeat Toshiba's Sealime protection (like a military reconaissance mission). After gathering this information the second step to fully defeat Toshiba's Sealime will be prepared.

NOTE - Mich-C is busy with a project for Takee 1 at the moment. He will test BootStomp and DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers, as soon as possible.
https://github.com/ucsb-seclab/dr_checker
 
Last edited:
  • Like
Reactions: beholder21

fizzefazze

Member
Nov 9, 2010
16
3
0
I have tried Kingoroot and Kingroot both the PC Version and the Android version numerous times without success. I could not get (temporary) root.
Can anyone report which firmware they are running, and which app and whether it is from the PC or on the device itself?
Or whether they do anything else other than that? Disable Wifi/4G? Set airplane mode?...?