• Introducing XDA Computing: Discussion zones for Hardware, Software, and more!    Check it out!

what root exploits work on this version

Search This thread

dankpods

Member
Sep 20, 2021
12
0
all the exploits are just a bunch of c code and idk how to compile code
Screenshot_20211206-113041.png
 
D

Deleted member 1890170

Guest
Rooting is the act of unlocking the Android OS to gain complete control over the device through which you can access hidden files, change the ROM or install certain special apps. Rooting Android OS simply means to add Superuser AKA Root functionality to it.
This Superuser functionality is part of every Linux OS distribution. Because Android OS is based on a Linux OS kernel, so all you what have to do is to add the SU binary to Android OS.

The most primitive method to achieve this is to run this command sequence on PC - what requires USB Debug option got enabled in Android OS:

Code:
adb devices
adb push <LOCATION-OF-SU-BINARY-ON-PC-HERE> /data/local/tmp/
adb shell "chmod +x /data/local/tmp/su"

When it's needed to apply a shell command what requires elevated rights ( read: root rights ) then you in Android OS terminal app run

Code:
/data/local/tmp/su -c "SHELL-COMMAND-HERE>"
 

dankpods

Member
Sep 20, 2021
12
0
Rooting is the act of unlocking the Android OS to gain complete control over the device through which you can access hidden files, change the ROM or install certain special apps. Rooting Android OS simply means to add Superuser AKA Root functionality to it.
This Superuser functionality is part of every Linux OS distribution. Because Android OS is based on a Linux OS kernel, so all you what have to do is to add the SU binary to Android OS.

The most primitive method to achieve this is to run this command sequence on PC - what requires USB Debug option got enabled in Android OS:

Code:
adb devices
adb push <LOCATION-OF-SU-BINARY-ON-PC-HERE> /data/local/tmp/
adb shell "chmod +x /data/local/tmp/su"

When it's needed to apply a shell command what requires elevated rights ( read: root rights ) then you in Android OS terminal app run

Code:
/data/local/tmp/su -c "SHELL-COMMAND-HERE>"
it doesn't work like that