thats nice. do you think we care? Leave this forum open for root discussion.
thats nice. do you think we care? Leave this forum open for root discussion.
...
Back on topic, all htc phones used to have the serial port shared with the handsfree/usb plug, does anybody know where is the serial port for this phone is? I'd need a full dmesg and check what the bootloader says through serial when it starts... That's how haykuro found a hole for 32A Magic..
...
Funny given the fact it was my idea to open this thread in the first place...
By the way, I said that because it would make it easier to be able to root the device and have a chance of getting a bootloader with less restrictions, but hey, if you don't care...perfectly fine for me, I really don't care what you do think either.
-------------------------------------
Sent via the XDA Tapatalk App
I know nothing when it comes to rooting, but I do know Android is linux, and the X10 runs kernel 2.6.29, I found an exploit for this kernel but I don't know if it's possible to use on our Android OS??
Here's the link, hope it helps in some way......
http://www.milw0rm.com/exploits/8369
(Update)
Here's one more:
http://www.milw0rm.com/exploits/8678
From balsat -
I'm messing around with a 2.6.29 exploit for the HTC tattoo, it might work on the X10 if they haven't closed the hole.
Root exploit
I uploaded the m7 file to /data/local/bin with "adb push m7 /data/local/bin/m7" opened a shell on the phone with "adb shell" changed the permissions with "adb chmod 755 /data/local/bin/m7" and started the exploit with "cd /data/local/bin" "while `true` ; do /data/local/bin/m7; done" after a while i got this output :
usage: reboot [-n] [-p] [rebootcommand]
exit!
reroc/8446/cmdline[ WIN! 8446
EIP: 70000484 Instruction executed: e01858cd
Wrote shellcode e0400000 line 0
Wrote shellcode e3a07023 line 1
Wrote shellcode ef000000 line 2
Wrote shellcode e0400000 line 3
Wrote shellcode e3a07017 line 4
Wrote shellcode ef000000 line 5
Wrote shellcode e0433003 line 6
Wrote shellcode e28f0014 line 7
Wrote shellcode e50d0008 line 8
Wrote shellcode e50d3004 line 9
Wrote shellcode e24d1008 line 10
Wrote shellcode e24d2004 line 11
Wrote shellcode e3a0700b line 12
Wrote shellcode ef000000 line 13
Wrote shellcode 7379732f line 14
Wrote shellcode 2f6d6574 line 15
Wrote shellcode 2f6e6962 line 16
Wrote shellcode 6873 line 17
Wrote shellcode 0 line 18
[ Overwritten 0x70000484
But i still got NO root, id tell me :
$ /system/bin/id
uid=2000(shell) gid=2000(shell) groups=1003(graphics),1004(input),1007(log),1011(a db),1015(sdcard_rw),3001(net_bt_admin),3002(net_bt ),3003(inet)
And it somehow ****s with the PATH :
$ ls
ls: not found
$ Cannot set process group (Operation not permitted) at 225
Maybe a hardcore coder can change the program so it will work!?
This exploit cannot be used because the X10 linux kernel is patched.
I downloaded the X10 kernel sources from the SE web site and I checked the ptrace.c file in the kernel folder. Unfortunately, it is patched.
However, because SE provides the X10 kernel source code, we can easily check if an exploit can be used or not.
Thanks Bin4ry! I will try first on my own Thanks for your support!For compilig use the Android-NDK (NOT SDK!). Create an Android.mk and Application.mk
If you need an example Android.mk and Application.mk write an PN.
-Bin4ry