Guest User

CASUAL r515-pmsrefugee

a guest
Nov 8th, 2014
193
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 21.32 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:515 build:3,777
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\Big%20Daddy\Downloads\NoYouVerizon-GalaxyNote2-CASUAL%20R515%20(1).jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Picking Jar File:/C:/Users/Big%20Daddy/Downloads/NoYouVerizon-GalaxyNote2-CASUAL%20R515%20(1).jar
  10. [DEBUG]Found Windows Computer
  11. [DEBUG]Attempting to write C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Elevate.exe
  12. [DEBUG]File verified.
  13. [DEBUG]Attempting to write C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe
  14. [DEBUG]File verified.
  15. [DEBUG]Attempting to write C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\AdbWinApi.dll
  16. [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\AdbWinUsbApi.dll
  19. [DEBUG]File verified.
  20. [DEBUG]sleeping for Windows ADB start
  21. [DEBUG]OMFGWOOT GUI running!
  22. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  23.  
  24. [DEBUG]Searching for scripts
  25. [DEBUG]Updating Scripts for UI
  26. [VERBOSE]From Resource: true
  27. [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
  28. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  29.  
  30. [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  31. [DEBUG]Exiting comboBoxUpdate()
  32. [DEBUG]attempted to lock controls but controls are not availble yet
  33. [DEBUG]Extracting archive....
  34. [DEBUG]Target Script Is resource
  35. [VERBOSE]Unzipping Superuser.apk
  36. [VERBOSE]Unzipping busybox
  37. [VERBOSE]Unzipping exploit
  38. [VERBOSE]Unzipping exynos-abuse
  39. [VERBOSE]Unzipping rootGN.sh
  40. [VERBOSE]Unzipping swagBoot
  41. [VERBOSE]Unzipping sch-i605-16gb.pit
  42. [VERBOSE]Unzipping sboot.bin
  43. [VERBOSE]Unzipping recoverThis
  44. [VERBOSE]Unzipping boot.img
  45. [VERBOSE]Unzipping su
  46. [VERBOSE]Unzip Complete
  47. [DEBUG]Attempting to write C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb_usb.ini
  48. [DEBUG]File verified.
  49. [DEBUG]###executing: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  50. [VERBOSE]List of devices attached
  51. [DEBUG]Device List:
  52.  
  53.  
  54.  
  55. [DEBUG]unknown
  56.  
  57. [DEBUG]State Change Detected, The new state is: 1
  58. [DEBUG]State Connected commanded
  59. [ERROR]
  60. [DEBUG]StartButtonActionPerformed() Script Activated
  61. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  62. [DEBUG]disk location for script resources
  63. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  64. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  65. [DEBUG]Lines in Script 64
  66. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@d6d770
  67. [DEBUG]CASUAL has initiated a multithreaded execution environment
  68. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  69. [DEBUG]Reading datastreamjava.io.DataInputStream@d6d770
  70. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  71. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  72. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  73. [INFO]Rebooting into download mode
  74. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  75. [DEBUG]sending
  76. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  77. [DEBUG]return from ADB:
  78. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  79. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  80. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  81. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  82. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  83. [DEBUG]Received Command: flash --pit "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  84. [DEBUG]verifying Heimdall deployment.
  85. [DEBUG]Attempting to write C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\libusb-1.0.dll
  86. [DEBUG]File verified.
  87. [DEBUG]Attempting to write C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\heimdall.exe
  88. [DEBUG]File verified.
  89. [VERBOSE]detected!
  90. [INFO]Executing Heimdall command.
  91. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  92. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\heimdall.exe###
  93. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  94.  
  95.  
  96.  
  97. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  98.  
  99. http://www.glassechidna.com.au/
  100.  
  101.  
  102.  
  103. This software is provided free of charge. Copying and redistribution is
  104.  
  105. encouraged.
  106.  
  107.  
  108.  
  109. If you appreciate this software and you would like to support future
  110.  
  111. development please consider donating:
  112.  
  113. http://www.glassechidna.com.au/donate/
  114.  
  115.  
  116.  
  117. Initialising connection...
  118.  
  119. Detecting device...
  120.  
  121. ERROR: Failed to access device. libusb error: -12
  122.  
  123. [ERROR]
  124. Drivers are Required Launching CADI.
  125. CASUAL Automated Driver Installer by jrloper.
  126. Installing Drivers now
  127. [VERBOSE]Driver Problems suck. Lemme make it easy.
  128. We're going to install drivers now. Lets do it.
  129. THIS PROCESS CAN TAKE UP TO 5 MINTUES.
  130. DURING THIS TIME YOU WILL NOT SEE ANYTHING.
  131. BE PATIENT!
  132. [DEBUG]Attempting to write C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\CADI.exe
  133. [DEBUG]File verified.
  134. [DEBUG]###executing: cmd.exe###
  135. [VERBOSE]null
  136. [INFO]
  137.  
  138. [INFO]
  139. [Heimdall Error Report] Detected:
  140. 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
  141. [/Heimdall Error Report]
  142.  
  143.  
  144. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  145. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\heimdall.exe###
  146. Heimdall v1.4 RC2
  147.  
  148.  
  149.  
  150. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  151.  
  152. http://www.glassechidna.com.au/
  153.  
  154.  
  155.  
  156. This software is provided free of charge. Copying and redistribution is
  157.  
  158. encouraged.
  159.  
  160.  
  161.  
  162. If you appreciate this software and you would like to support future
  163.  
  164. development please consider donating:
  165.  
  166. http://www.glassechidna.com.au/donate/
  167.  
  168.  
  169.  
  170. Initialising connection...
  171.  
  172. Detecting device...
  173.  
  174. Claiming interface...
  175.  
  176. Setting up interface...
  177.  
  178.  
  179.  
  180. Checking if protocol is initialised...
  181.  
  182. Protocol is not initialised.
  183.  
  184.  
  185.  
  186. Initialising protocol...
  187.  
  188. Protocol initialisation successful.
  189.  
  190.  
  191.  
  192. Beginning session...
  193.  
  194.  
  195.  
  196. This device may take up to 2 minutes to respond.
  197.  
  198. Please be patient!
  199.  
  200.  
  201.  
  202. Session begun.
  203.  
  204.  
  205.  
  206. Uploading PIT
  207.  
  208. PIT upload successful
  209.  
  210.  
  211.  
  212. Uploading BOOTLOADER
  213.  
  214. 0%
  215. 
  216. 100%
  217.  
  218. BOOTLOADER upload successful
  219.  
  220.  
  221.  
  222. Uploading BOOT
  223.  
  224. 0%
  225. 
  226. 19%
  227. 
  228. 
  229. 38%
  230. 
  231. 
  232. 57%
  233. 
  234. 
  235. 76%
  236. 
  237. 
  238. 95%
  239. 
  240. 
  241. 100%
  242.  
  243. BOOT upload successful
  244.  
  245.  
  246.  
  247. Ending session...
  248.  
  249. Rebooting device...
  250.  
  251. Releasing device interface...
  252.  
  253.  
  254.  
  255. [INFO]
  256. [Heimdall Success]
  257.  
  258.  
  259. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  260. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  261. [INFO]Your device should be rebooting into Android now.
  262. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  263. [INFO]Waiting for ADB device connection. When Windows 7 recognizes the device, we will continue. Don't touch anything.
  264. [DEBUG]sending
  265. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  266. [DEBUG]return from ADB:
  267. [DEBUG]Ignoring commented line#Reboot to clear logs
  268. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  269. [DEBUG]sending
  270. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  271. mkdir failed for /data/local/tmp, File exists
  272.  
  273.  
  274. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  275.  
  276.  
  277. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  278. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  279. [INFO]Pushing dependencies
  280. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  281. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  282. [INFO]Pushing su binary...
  283. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  284. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  285. [DEBUG]Expanded $ZIPFILE: push "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  286. [DEBUG]sending
  287. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  288. 6025 KB/s (96260 bytes in 0.015s)
  289.  
  290. [DEBUG]return from ADB:6025 KB/s (96260 bytes in 0.015s)
  291.  
  292. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  293. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  294. [INFO]Pushing SuperSU app...
  295. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  296. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  297. [DEBUG]Expanded $ZIPFILE: push "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  298. [DEBUG]sending
  299. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  300. 5199 KB/s (996704 bytes in 0.187s)
  301.  
  302. [DEBUG]return from ADB:5199 KB/s (996704 bytes in 0.187s)
  303.  
  304. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  305. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  306. [INFO]Pushing Exynos-Abuse exploit
  307. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  308. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse exists
  309. [DEBUG]Expanded $ZIPFILE: push "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse" /data/local/tmp/
  310. [DEBUG]sending
  311. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  312. cannot open 'C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse': No such file or directory
  313.  
  314. [DEBUG]return from ADB:cannot open 'C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse': No such file or directory
  315.  
  316. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  317. [DEBUG]Received ECHO command$ECHO Pushing root script
  318. [INFO]Pushing root script
  319. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  320. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh exists
  321. [DEBUG]Expanded $ZIPFILE: push "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh" /data/local/tmp/
  322. [DEBUG]sending
  323. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  324. 0 KB/s (361 bytes in 1.000s)
  325.  
  326. [DEBUG]return from ADB:0 KB/s (361 bytes in 1.000s)
  327.  
  328. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  329. [DEBUG]Received ECHO command$ECHO Pushing pit
  330. [INFO]Pushing pit
  331. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  332. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit exists
  333. [DEBUG]Expanded $ZIPFILE: push "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit" /data/local/tmp/
  334. [DEBUG]sending
  335. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  336. 8 KB/s (8192 bytes in 1.000s)
  337.  
  338. [DEBUG]return from ADB:8 KB/s (8192 bytes in 1.000s)
  339.  
  340. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  341. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  342. [INFO]Setting Permissions....
  343. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  344. [DEBUG]sending
  345. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  346. [DEBUG]return from ADB:
  347. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  348. [DEBUG]sending
  349. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  350. [DEBUG]return from ADB:
  351. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  352. [DEBUG]sending
  353. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  354. [DEBUG]return from ADB:
  355. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  356. [DEBUG]sending
  357. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  358. [DEBUG]return from ADB:
  359. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  360. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  361. [INFO]Executing Root Exploit.
  362. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  363. [DEBUG]sending
  364. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  365. [DEBUG]return from ADB:
  366. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  367. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  368. [INFO][x]Ready for exploit
  369. [DEBUG]Ignoring commented line#Verify Device is proper
  370. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  371. [DEBUG]checking for results to be false
  372. [DEBUG]requesting shell "cat /proc/version"
  373. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  374. [DEBUG]sending
  375. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  376. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  377.  
  378.  
  379. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  380.  
  381.  
  382. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  383.  
  384.  
  385. [DEBUG]***NEW EVENT ADDED***
  386. [DEBUG]ON EVENT: noroot
  387. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  388. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  389. [DEBUG]sending
  390. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  391. /system/bin/sh: su: not found
  392.  
  393.  
  394. [DEBUG]return from ADB:/system/bin/sh: su: not found
  395.  
  396.  
  397. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  398. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  399. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  400. [INFO][x]Device Verification Checks Complete
  401. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  402. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  403. [INFO][x]Ready for exploit
  404. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  405. [DEBUG]Received ECHO command$ECHO Injecting Code
  406. [INFO]Injecting Code
  407. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  408. [DEBUG]sending
  409. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  410. /system/bin/sh: su: not found
  411.  
  412.  
  413. [DEBUG]return from ADB:/system/bin/sh: su: not found
  414.  
  415.  
  416. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  417. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  418. [INFO][x]Exploit Injection Done.
  419. [DEBUG]SCRIPT COMMAND:reboot download
  420. [DEBUG]sending
  421. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\adb.exe###
  422. [DEBUG]return from ADB:
  423. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  424. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  425. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  426. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  427. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot exists
  428. [VERBOSE]verified C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis exists
  429. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  430. [DEBUG]Received Command: flash --82 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  431. [DEBUG]verifying Heimdall deployment.
  432. [VERBOSE]detected!
  433. [INFO]Executing Heimdall command.
  434. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  435. [DEBUG]###executing real-time command: C:\Users\BIGDAD~1\AppData\Local\Temp\Big DaddyTEMPCASUAL8F1AAE36\heimdall.exe###
  436. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  437.  
  438.  
  439.  
  440. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  441.  
  442. http://www.glassechidna.com.au/
  443.  
  444.  
  445.  
  446. This software is provided free of charge. Copying and redistribution is
  447.  
  448. encouraged.
  449.  
  450.  
  451.  
  452. If you appreciate this software and you would like to support future
  453.  
  454. development please consider donating:
  455.  
  456. http://www.glassechidna.com.au/donate/
  457.  
  458.  
  459.  
  460. Initialising connection...
  461.  
  462. Detecting device...
  463.  
  464. Claiming interface...
  465.  
  466. Setting up interface...
  467.  
  468.  
  469.  
  470. Checking if protocol is initialised...
  471.  
  472. Protocol is not initialised.
  473.  
  474.  
  475.  
  476. Initialising protocol...
  477.  
  478. Protocol initialisation successful.
  479.  
  480.  
  481.  
  482. Beginning session...
  483.  
  484.  
  485.  
  486. This device may take up to 2 minutes to respond.
  487.  
  488. Please be patient!
  489.  
  490.  
  491.  
  492. Session begun.
  493.  
  494.  
  495.  
  496. Downloading device's PIT file...
  497.  
  498. PIT file download successful.
  499.  
  500.  
  501.  
  502. ERROR: No partition with identifier "60" exists in the specified PIT.
  503.  
  504. Ending session...
  505.  
  506. Rebooting device...
  507.  
  508. Releasing device interface...
  509.  
  510.  
  511.  
  512. [ERROR]
  513. [Heimdall Error Report] Detected:
  514. Heimdall uncontinuable error; Script halted
  515. [/Heimdall Error Report]
  516.  
  517.  
  518. [DEBUG]HALT RECEIVED
  519. [DEBUG]Finishing remaining commands:$SENDLOG
  520. [DEBUG]Sendlog Command Issued!
  521. No remaining commands
  522. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment