Advertisement
Guest User

CASUAL r465-eesshoo

a guest
Feb 25th, 2014
239
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 24.51 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:465 build:3662
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\Esho\Downloads\BackAtchaVerizon-CASUAL-Revision465b.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Picking Jar File:/C:/Users/Esho/Downloads/BackAtchaVerizon-CASUAL-Revision465b.jar
  10. [DEBUG]Found Windows Computer
  11. [DEBUG]Found: WindowsLinux Galaxy Note 2 Jailbreak
  12. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\Elevate.exe
  13. [DEBUG]File verified.
  14. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe
  15. [DEBUG]File verified.
  16. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\AdbWinApi.dll
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\AdbWinUsbApi.dll
  19. [DEBUG]File verified.
  20. [DEBUG]sleeping for Windows ADB start
  21. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb_usb.ini
  22. [DEBUG]File verified.
  23. [DEBUG]###executing: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  24. [VERBOSE]List of devices attached
  25. [DEBUG]Device List:
  26. 42f7a216a78d9f3b device
  27.  
  28.  
  29.  
  30. [DEBUG]device
  31.  
  32. [DEBUG]device
  33.  
  34. [DEBUG]State Change Detected, The new state is: 1
  35. [DEBUG]State Connected commanded
  36. [DEBUG]State Change Detected, The new state is: 1
  37. [DEBUG]State Connected commanded
  38. [DEBUG]State Change Detected, The new state is: 1
  39. [DEBUG]State Connected commanded
  40. [DEBUG]State Change Detected, The new state is: 1
  41. [DEBUG]State Connected commanded
  42. [DEBUG]State Change Detected, The new state is: 1
  43. [DEBUG]State Connected commanded
  44. [DEBUG]State Change Detected, The new state is: 1
  45. [DEBUG]State Connected commanded
  46. [DEBUG]State Change Detected, The new state is: 1
  47. [DEBUG]State Connected commanded
  48. [DEBUG]State Change Detected, The new state is: 1
  49. [DEBUG]State Connected commanded
  50. [DEBUG]Control Change requested but Statics.MasterLock is set.
  51. [DEBUG]OMFGWOOT GUI running!
  52. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  53.  
  54. [DEBUG]Searching for scripts
  55. [DEBUG]Updating Scripts for UI
  56. [VERBOSE]From Resource: true
  57. [INFO]--WindowsLinux Galaxy Note 2 Jailbreak--
  58. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  59.  
  60. [DEBUG]Created zipResource at /SCRIPTS/WindowsLinux Galaxy Note 2 Jailbreak.zip
  61. [DEBUG]Exiting comboBoxUpdate()
  62. [DEBUG]attempted to lock controls but controls are not availble yet
  63. [DEBUG]Extracting archive....
  64. [DEBUG]Target Script Is resource
  65. [VERBOSE]Unzipping Superuser.apk
  66. [VERBOSE]Unzipping boot.img
  67. [DEBUG]State Change Detected, The new state is: 1
  68. [DEBUG]State Connected commanded
  69. [DEBUG]Control Change requested but Statics.MasterLock is set.
  70. [DEBUG]Control Change requested but Statics.MasterLock is set.
  71. [VERBOSE]Unzipping busybox
  72. [VERBOSE]Unzipping dependentinstaller.sh
  73. [VERBOSE]Unzipping exploit
  74. [VERBOSE]Unzipping exynos-abuse
  75. [VERBOSE]Unzipping recoverThis
  76. [DEBUG]Control Change requested but Statics.MasterLock is set.
  77. [DEBUG]Control Change requested but Statics.MasterLock is set.
  78. [VERBOSE]Unzipping rootGN.sh
  79. [VERBOSE]Unzipping su
  80. [VERBOSE]Unzipping swagBoot
  81. [VERBOSE]Unzipping viewmem
  82. [VERBOSE]Unzip Complete
  83. [DEBUG]State Change Detected, The new state is: 1
  84. [DEBUG]State Connected commanded
  85. [DEBUG]Controls Enabled status: true
  86. [DEBUG]State Change Detected, The new state is: 0
  87. [DEBUG]State Disconnected commanded
  88. [DEBUG]Controls Enabled status: false
  89. [DEBUG]State Change Detected, The new state is: 1
  90. [DEBUG]State Connected commanded
  91. [DEBUG]Controls Enabled status: true
  92. [ERROR]
  93. [DEBUG]StartButtonActionPerformed() Script Activated
  94. [DEBUG]Script known as WindowsLinux Galaxy Note 2 Jailbreak is running
  95. [DEBUG]Controls Enabled status: false
  96. [DEBUG]disk location for script resources
  97. [DEBUG]Loading internal resource: WindowsLinux Galaxy Note 2 Jailbreak
  98. [DEBUG]Selected resourceWindowsLinux Galaxy Note 2 Jailbreak
  99. [DEBUG]Lines in Script 66
  100. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@8c8a04
  101. [DEBUG]CASUAL has initiated a multithreaded execution environment
  102. [DEBUG]/SCRIPTS/WindowsLinux Galaxy Note 2 Jailbreak not found in repository.
  103. [DEBUG]Reading datastreamjava.io.DataInputStream@8c8a04
  104. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the Back Atcha Verizon Odin Bootloader\n package for you.
  105. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  106. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  107. [INFO]Rebooting into download mode
  108. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  109. [DEBUG]sending
  110. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  111. [DEBUG]return from ADB:
  112. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --8 "$ZIPFILEboot.img"
  113. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --8 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  114. [DEBUG]Received Command: flash --8 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  115. [DEBUG]verifying Heimdall deployment.
  116. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\libusb-1.0.dll
  117. [DEBUG]File verified.
  118. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\heimdall.exe
  119. [DEBUG]File verified.
  120. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\msvcp110.dll
  121. [DEBUG]File verified.
  122. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\msvcr110.dll
  123. [DEBUG]File verified.
  124. [VERBOSE]detected!
  125. [INFO]Executing Heimdall command.
  126. [VERBOSE]Performing standard Heimdall commandflash --8 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  127. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\heimdall.exe###
  128. Waiting for Downoad Mode device...Heimdall v1.4 RC2
  129.  
  130.  
  131.  
  132. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  133.  
  134. http://www.glassechidna.com.au/
  135.  
  136.  
  137.  
  138. This software is provided free of charge. Copying and redistribution is
  139.  
  140. encouraged.
  141.  
  142.  
  143.  
  144. If you appreciate this software and you would like to support future
  145.  
  146. development please consider donating:
  147.  
  148. http://www.glassechidna.com.au/donate/
  149.  
  150.  
  151.  
  152. Initialising connection...
  153.  
  154. Detecting device...
  155.  
  156. ERROR: Failed to access device. libusb error: -12
  157.  
  158. [ERROR]
  159. Drivers are Required Launching CADI.
  160. CASUAL Automated Driver Installer by jrloper.
  161. Installing Drivers now
  162. [VERBOSE]Driver Problems suck. Lemme make it easy.
  163. We're going to install drivers now. Lets do it.
  164. [DEBUG]Attempting to write C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\CADI.exe
  165. [DEBUG]File verified.
  166. [DEBUG]###executing: cmd.exe###
  167. [VERBOSE]
  168. [INFO]
  169. CASUAL's AUTOMATED DRIVER INSTALLER
  170.  
  171. This program uses libwdi by Pete Batard
  172.  
  173. Compatible Windows Version Detected...
  174. Getting Device List...
  175. Device List Aquired...
  176. Parsing...
  177. Target Device Found:"dg_ssudbus" Found at:( 04E8:685D )
  178. Preparing Driver...
  179. Driver Prepared...
  180. Installing Driver...
  181. Installing Driver...
  182. cadi:debug [installer process] got parameter cadi.inf
  183. cadi:debug [installer process] got device_id: 'USB\VID_04E8&PID_685D\5&53AB3F7&0&2'
  184. cadi:debug [installer process] got hardware_id: 'USB\VID_04E8&PID_685D&REV_021;'
  185. cadi:debug [installer process] got user_sid: 'S-1-5-21-143490716-2076412120-366596988-1000'
  186. cadi:debug [installer process] using syslog 'C:\windows\setupact.log'
  187. cadi:debug [installer process] sylog reader thread started
  188. cadi:debug [installer process] successfully disabled the system restore point creation setting
  189. cadi:debug [installer process] Installing driver for USB\VID_04E8&PID_685D&REV_021; - please wait...
  190. cadi:debug [installer process] driver update completed
  191. cadi:debug [installer process] re-enumerating driver node USB\VID_04E8&PID_685D\5&53AB3F7&0&2...
  192. cadi:debug [installer process] re-enumeration succeeded...
  193. cadi:debug [installer process] successfully restored the system restore point creation setting
  194. Driver Installed Successfully...
  195. Continuing...
  196. Target Device Found:"Modem" Found at:( 04E8:685D )
  197. Preparing Driver...
  198. Driver Prepared...
  199. Installing Driver...
  200. Installing Driver...
  201. cadi:debug [installer process] got parameter cadi.inf
  202. cadi:debug [installer process] got device_id: 'USB\VID_04E8&PID_685D&MODEM\6&9E648A6&2&0000'
  203. cadi:debug [installer process] got hardware_id: 'USB\VID_04E8&PID_685D&REV_021;&Modem'
  204. cadi:debug [installer process] got user_sid: 'S-1-5-21-143490716-2076412120-366596988-1000'
  205. cadi:debug [installer process] using syslog 'C:\windows\setupact.log'
  206. cadi:debug [installer process] sylog reader thread started
  207. cadi:debug [installer process] successfully disabled the system restore point creation setting
  208. cadi:debug [installer process] Installing driver for USB\VID_04E8&PID_685D&REV_021;&Modem - please wait...
  209. cadi:debug [installer process] device not detected (copying driver files for next time device is plugged in)
  210. cadi:debug [installer process] Copying inf file (for the next time device is plugged) - please wait...
  211. cadi:debug [installer process] copied inf to C:\windows\INF\oem106.inf
  212. cadi:debug [installer process] re-enumerating driver node USB\VID_04E8&PID_685D&MODEM\6&9E648A6&2&0000...
  213. cadi:debug [installer process] failed to locate device_id USB\VID_04E8&PID_685D&MODEM\6&9E648A6&2&0000: d
  214.  
  215. cadi:debug [installer process] successfully restored the system restore point creation setting
  216. Driver Installed Successfully...
  217. Continuing...
  218. 2 Devices Install Successfully...
  219. Quiting...
  220.  
  221. cadi:info [CADI] Success
  222.  
  223.  
  224. [INFO]
  225. [Heimdall Error Report] Detected:
  226. 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
  227. [/Heimdall Error Report]
  228.  
  229.  
  230. [VERBOSE]Performing standard Heimdall commandflash --8 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  231. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\heimdall.exe###
  232. Heimdall v1.4 RC2
  233.  
  234.  
  235.  
  236. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  237.  
  238. http://www.glassechidna.com.au/
  239.  
  240.  
  241.  
  242. This software is provided free of charge. Copying and redistribution is
  243.  
  244. encouraged.
  245.  
  246.  
  247.  
  248. If you appreciate this software and you would like to support future
  249.  
  250. development please consider donating:
  251.  
  252. http://www.glassechidna.com.au/donate/
  253.  
  254.  
  255.  
  256. Initialising connection...
  257.  
  258. Detecting device...
  259.  
  260. Claiming interface...
  261.  
  262. Setting up interface...
  263.  
  264.  
  265.  
  266. Checking if protocol is initialised...
  267.  
  268. Protocol is not initialised.
  269.  
  270.  
  271.  
  272. Initialising protocol...
  273.  
  274. Protocol initialisation successful.
  275.  
  276.  
  277.  
  278. Beginning session...
  279.  
  280.  
  281.  
  282. This device may take up to 2 minutes to respond.
  283.  
  284. Please be patient!
  285.  
  286.  
  287.  
  288. Session begun.
  289.  
  290.  
  291.  
  292. Downloading device's PIT file...
  293.  
  294. PIT file download successful.
  295.  
  296.  
  297.  
  298. Uploading BOOT
  299.  
  300. 0%
  301. 
  302. 19%
  303. 
  304. 
  305. 38%
  306. 
  307. 
  308. 57%
  309. 
  310. 
  311. 76%
  312. 
  313. 
  314. 95%
  315. 
  316. 
  317. 100%
  318.  
  319. BOOT upload successful
  320.  
  321.  
  322.  
  323. Ending session...
  324.  
  325. Rebooting device...
  326.  
  327. Releasing device interface...
  328.  
  329.  
  330.  
  331. [INFO]
  332. [Heimdall Success]
  333.  
  334.  
  335. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  336. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  337. [INFO]Your device should be rebooting into Android now.
  338. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  339. [INFO]waiting for ADB device connection...
  340. [DEBUG]sending
  341. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  342. [DEBUG]return from ADB:
  343. [DEBUG]Ignoring commented line#Reboot to clear logs
  344. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  345. [DEBUG]sending
  346. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  347. mkdir failed for /data/local/tmp, File exists
  348.  
  349.  
  350. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  351.  
  352.  
  353. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  354. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  355. [INFO]Pushing dependencies
  356. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  357. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  358. [INFO]Pushing su binary...
  359. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  360. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\su" /data/local/tmp/
  361. [DEBUG]sending
  362. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  363. 718 KB/s (91980 bytes in 0.125s)
  364.  
  365. [DEBUG]return from ADB:718 KB/s (91980 bytes in 0.125s)
  366.  
  367. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  368. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  369. [INFO]Pushing SuperSU app...
  370. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  371. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\Superuser.apk" /data/local/tmp/
  372. [DEBUG]sending
  373. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  374. 1893 KB/s (996704 bytes in 0.514s)
  375.  
  376. [DEBUG]return from ADB:1893 KB/s (996704 bytes in 0.514s)
  377.  
  378. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  379. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  380. [INFO]Pushing Exynos-Abuse exploit
  381. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  382. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\exynos-abuse" /data/local/tmp/
  383. [DEBUG]sending
  384. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  385. 1796 KB/s (64373 bytes in 0.035s)
  386.  
  387. [DEBUG]return from ADB:1796 KB/s (64373 bytes in 0.035s)
  388.  
  389. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  390. [DEBUG]Received ECHO command$ECHO Pushing root script
  391. [INFO]Pushing root script
  392. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  393. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\rootGN.sh" /data/local/tmp/
  394. [DEBUG]sending
  395. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  396. 44 KB/s (361 bytes in 0.008s)
  397.  
  398. [DEBUG]return from ADB:44 KB/s (361 bytes in 0.008s)
  399.  
  400. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Busybox
  401. [DEBUG]Received ECHO command$ECHO Pushing Busybox
  402. [INFO]Pushing Busybox
  403. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEbusybox" /data/local/tmp/
  404. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\busybox" /data/local/tmp/
  405. [DEBUG]sending
  406. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  407. 2130 KB/s (1867568 bytes in 0.856s)
  408.  
  409. [DEBUG]return from ADB:2130 KB/s (1867568 bytes in 0.856s)
  410.  
  411. [DEBUG]SCRIPT COMMAND:$ECHO Pushing viewmem
  412. [DEBUG]Received ECHO command$ECHO Pushing viewmem
  413. [INFO]Pushing viewmem
  414. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEviewmem" /data/local/tmp/
  415. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\viewmem" /data/local/tmp/
  416. [DEBUG]sending
  417. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  418. 480 KB/s (5417 bytes in 0.011s)
  419.  
  420. [DEBUG]return from ADB:480 KB/s (5417 bytes in 0.011s)
  421.  
  422. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  423. [DEBUG]Received ECHO command$ECHO Pushing pit
  424. [INFO]Pushing pit
  425. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  426. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\exploit" /data/local/tmp/
  427. [DEBUG]sending
  428. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  429. 727 KB/s (8192 bytes in 0.011s)
  430.  
  431. [DEBUG]return from ADB:727 KB/s (8192 bytes in 0.011s)
  432.  
  433. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  434. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  435. [INFO]Setting Permissions....
  436. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  437. [DEBUG]sending
  438. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  439. [DEBUG]return from ADB:
  440. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  441. [DEBUG]sending
  442. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  443. [DEBUG]return from ADB:
  444. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  445. [DEBUG]sending
  446. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  447. [DEBUG]return from ADB:
  448. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  449. [DEBUG]sending
  450. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  451. [DEBUG]return from ADB:
  452. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  453. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  454. [INFO]Executing Root Exploit.
  455. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  456. [DEBUG]sending
  457. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  458. [*] s_show->seq_printf format string found at: 0xC086C348
  459.  
  460.  
  461. [*] sys_setresuid found at 0xC00967C4
  462.  
  463.  
  464. [*] patching sys_setresuid at 0xC0096808
  465.  
  466.  
  467. remounting system rw....
  468.  
  469.  
  470. moving su into position
  471.  
  472.  
  473. moving Superuser.apk into position
  474.  
  475.  
  476. [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
  477.  
  478. [*] sys_setresuid found at 0xC00967C4
  479.  
  480. [*] patching sys_setresuid at 0xC0096808
  481.  
  482. remounting system rw....
  483.  
  484. moving su into position
  485.  
  486. moving Superuser.apk into position
  487.  
  488.  
  489. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/viewmem; chmod 777 /data/local/tmp/busybox"
  490. [DEBUG]sending
  491. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  492. [DEBUG]return from ADB:
  493. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  494. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  495. [INFO][x]Ready for exploit
  496. [DEBUG]Ignoring commented line#Verify Device is proper
  497. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  498. [DEBUG]checking for results to be false
  499. [DEBUG]requesting shell "cat /proc/version"
  500. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  501. [DEBUG]sending
  502. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  503. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  504.  
  505.  
  506. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  507.  
  508.  
  509. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  510.  
  511.  
  512. [DEBUG]***NEW EVENT ADDED***
  513. [DEBUG]ON EVENT: noroot
  514. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  515. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  516. [DEBUG]sending
  517. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  518. [x]Found rooted device
  519.  
  520.  
  521. [DEBUG]return from ADB:[x]Found rooted device
  522.  
  523.  
  524. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  525. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  526. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  527. [INFO][x]Device Verification Checks Complete
  528. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  529. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  530. [INFO][x]Ready for exploit
  531. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  532. [DEBUG]Received ECHO command$ECHO Injecting Code
  533. [INFO]Injecting Code
  534. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  535. [DEBUG]sending
  536. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  537. 16+0 records in
  538.  
  539.  
  540. 16+0 records out
  541.  
  542.  
  543. 8192 bytes transferred in 0.002 secs (4096000 bytes/sec)
  544.  
  545.  
  546. [DEBUG]return from ADB:16+0 records in
  547.  
  548. 16+0 records out
  549.  
  550. 8192 bytes transferred in 0.002 secs (4096000 bytes/sec)
  551.  
  552.  
  553. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  554. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  555. [INFO][x]Exploit Injection Done.
  556. [DEBUG]SCRIPT COMMAND:reboot download
  557. [DEBUG]sending
  558. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\adb.exe###
  559. [DEBUG]return from ADB:
  560. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  561. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  562. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  563. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  564. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  565. [DEBUG]Received Command: flash --82 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  566. [DEBUG]verifying Heimdall deployment.
  567. [VERBOSE]detected!
  568. [INFO]Executing Heimdall command.
  569. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  570. [DEBUG]###executing real-time command: C:\Users\Esho\AppData\Local\Temp\EshoTEMPCASUAL7BA1DE67\heimdall.exe###
  571. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  572.  
  573.  
  574.  
  575. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  576.  
  577. http://www.glassechidna.com.au/
  578.  
  579.  
  580.  
  581. This software is provided free of charge. Copying and redistribution is
  582.  
  583. encouraged.
  584.  
  585.  
  586.  
  587. If you appreciate this software and you would like to support future
  588.  
  589. development please consider donating:
  590.  
  591. http://www.glassechidna.com.au/donate/
  592.  
  593.  
  594.  
  595. Initialising connection...
  596.  
  597. Detecting device...
  598.  
  599. Claiming interface...
  600.  
  601. Setting up interface...
  602.  
  603.  
  604.  
  605. Checking if protocol is initialised...
  606.  
  607. Protocol is not initialised.
  608.  
  609.  
  610.  
  611. Initialising protocol...
  612.  
  613. Protocol initialisation successful.
  614.  
  615.  
  616.  
  617. Beginning session...
  618.  
  619.  
  620.  
  621. This device may take up to 2 minutes to respond.
  622.  
  623. Please be patient!
  624.  
  625.  
  626.  
  627. Session begun.
  628.  
  629.  
  630.  
  631. Downloading device's PIT file...
  632.  
  633. PIT file download successful.
  634.  
  635.  
  636.  
  637. Uploading recovery
  638.  
  639. 0%
  640. 
  641. 12%
  642. 
  643. 
  644. 25%
  645. 
  646. 
  647. 37%
  648. 
  649. 
  650. 50%
  651. 
  652. 
  653. 62%
  654. 
  655. 
  656. 75%
  657. 
  658. 
  659. 87%
  660. 
  661. 
  662. 100%
  663.  
  664. ERROR: Failed to confirm end of file transfer sequence!
  665.  
  666. ERROR: recovery upload failed!
  667.  
  668.  
  669.  
  670. Ending session...
  671.  
  672. ERROR: Failed to send end session packet!
  673.  
  674. Releasing device interface...
  675.  
  676.  
  677.  
  678. [ERROR]
  679. [Heimdall Error Report] Detected:
  680. Heimdall uncontinuable error; Script halted
  681. [/Heimdall Error Report]
  682.  
  683.  
  684. [DEBUG]HALT RECEIVED
  685. [DEBUG]Finishing remaining commands:$SENDLOG
  686. [DEBUG]Sendlog Command Issued!
  687. No remaining commands
  688. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement