Advertisement
Guest User

CASUAL r465-test

a guest
Apr 17th, 2014
50
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.85 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:465 build:3662
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\Tina\Desktop\BackAtchaVerizon-CASUAL-Revision465b.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Found Windows Computer
  10. [DEBUG]Picking Jar File:/C:/Users/Tina/Desktop/BackAtchaVerizon-CASUAL-Revision465b.jar
  11. [DEBUG]Found: WindowsLinux Galaxy Note 2 Jailbreak
  12. [DEBUG]Attempting to write C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\Elevate.exe
  13. [DEBUG]File verified.
  14. [DEBUG]Attempting to write C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe
  15. [DEBUG]File verified.
  16. [DEBUG]Attempting to write C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\AdbWinApi.dll
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\AdbWinUsbApi.dll
  19. [DEBUG]File verified.
  20. [DEBUG]sleeping for Windows ADB start
  21. [DEBUG]Attempting to write C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb_usb.ini
  22. [DEBUG]File verified.
  23. [DEBUG]###executing: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  24. [VERBOSE]List of devices attached
  25. [DEBUG]Device List:
  26.  
  27.  
  28.  
  29. [DEBUG]unknown
  30.  
  31. [DEBUG]unknown
  32.  
  33. [DEBUG]Control Change requested but Statics.MasterLock is set.
  34. [DEBUG]OMFGWOOT GUI running!
  35. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  36.  
  37. [DEBUG]Searching for scripts
  38. [DEBUG]Updating Scripts for UI
  39. [VERBOSE]From Resource: true
  40. [INFO]--WindowsLinux Galaxy Note 2 Jailbreak--
  41. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  42.  
  43. [DEBUG]Created zipResource at /SCRIPTS/WindowsLinux Galaxy Note 2 Jailbreak.zip
  44. [DEBUG]Exiting comboBoxUpdate()
  45. [DEBUG]attempted to lock controls but controls are not availble yet
  46. [DEBUG]Extracting archive....
  47. [DEBUG]Target Script Is resource
  48. [VERBOSE]Unzipping Superuser.apk
  49. [VERBOSE]Unzipping boot.img
  50. [VERBOSE]Unzipping busybox
  51. [VERBOSE]Unzipping dependentinstaller.sh
  52. [VERBOSE]Unzipping exploit
  53. [VERBOSE]Unzipping exynos-abuse
  54. [VERBOSE]Unzipping recoverThis
  55. [DEBUG]Control Change requested but Statics.MasterLock is set.
  56. [VERBOSE]Unzipping rootGN.sh
  57. [VERBOSE]Unzipping su
  58. [VERBOSE]Unzipping swagBoot
  59. [VERBOSE]Unzipping viewmem
  60. [VERBOSE]Unzip Complete
  61. [DEBUG]State Change Detected, The new state is: 1
  62. [DEBUG]State Connected commanded
  63. [DEBUG]Controls Enabled status: true
  64. [DEBUG]State Change Detected, The new state is: 0
  65. [DEBUG]State Disconnected commanded
  66. [DEBUG]Controls Enabled status: false
  67. [DEBUG]State Change Detected, The new state is: 1
  68. [DEBUG]State Connected commanded
  69. [DEBUG]Controls Enabled status: true
  70. [DEBUG]State Change Detected, The new state is: 0
  71. [DEBUG]State Disconnected commanded
  72. [DEBUG]Controls Enabled status: false
  73. [DEBUG]State Change Detected, The new state is: 1
  74. [DEBUG]State Connected commanded
  75. [DEBUG]Controls Enabled status: true
  76. [ERROR]
  77. [DEBUG]StartButtonActionPerformed() Script Activated
  78. [DEBUG]Script known as WindowsLinux Galaxy Note 2 Jailbreak is running
  79. [DEBUG]Controls Enabled status: false
  80. [DEBUG]disk location for script resources
  81. [DEBUG]Loading internal resource: WindowsLinux Galaxy Note 2 Jailbreak
  82. [DEBUG]Selected resourceWindowsLinux Galaxy Note 2 Jailbreak
  83. [DEBUG]Lines in Script 66
  84. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@1da2b6d
  85. [DEBUG]CASUAL has initiated a multithreaded execution environment
  86. [DEBUG]/SCRIPTS/WindowsLinux Galaxy Note 2 Jailbreak not found in repository.
  87. [DEBUG]Reading datastreamjava.io.DataInputStream@1da2b6d
  88. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the Back Atcha Verizon Odin Bootloader\n package for you.
  89. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  90. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  91. [INFO]Rebooting into download mode
  92. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  93. [DEBUG]sending
  94. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  95. [DEBUG]return from ADB:
  96. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --8 "$ZIPFILEboot.img"
  97. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --8 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  98. [DEBUG]Received Command: flash --8 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  99. [DEBUG]verifying Heimdall deployment.
  100. [DEBUG]Attempting to write C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\libusb-1.0.dll
  101. [DEBUG]File verified.
  102. [DEBUG]Attempting to write C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\heimdall.exe
  103. [DEBUG]File verified.
  104. [VERBOSE]detected!
  105. [INFO]Executing Heimdall command.
  106. [VERBOSE]Performing standard Heimdall commandflash --8 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  107. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\heimdall.exe###
  108. Waiting for Downoad Mode device...Heimdall v1.4 RC2
  109.  
  110.  
  111.  
  112. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  113.  
  114. http://www.glassechidna.com.au/
  115.  
  116.  
  117.  
  118. This software is provided free of charge. Copying and redistribution is
  119.  
  120. encouraged.
  121.  
  122.  
  123.  
  124. If you appreciate this software and you would like to support future
  125.  
  126. development please consider donating:
  127.  
  128. http://www.glassechidna.com.au/donate/
  129.  
  130.  
  131.  
  132. Initialising connection...
  133.  
  134. Detecting device...
  135.  
  136. ERROR: Failed to access device. libusb error: -12
  137.  
  138. [ERROR]
  139. Drivers are Required Launching CADI.
  140. CASUAL Automated Driver Installer by jrloper.
  141. Installing Drivers now
  142. [VERBOSE]Driver Problems suck. Lemme make it easy.
  143. We're going to install drivers now. Lets do it.
  144. [DEBUG]Attempting to write C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\CADI.exe
  145. [DEBUG]File verified.
  146. [DEBUG]###executing: cmd.exe###
  147. [VERBOSE]null
  148. [INFO]
  149.  
  150. [INFO]
  151. [Heimdall Error Report] Detected:
  152. 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
  153. [/Heimdall Error Report]
  154.  
  155.  
  156. [VERBOSE]Performing standard Heimdall commandflash --8 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  157. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\heimdall.exe###
  158. Heimdall v1.4 RC2
  159.  
  160.  
  161.  
  162. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  163.  
  164. http://www.glassechidna.com.au/
  165.  
  166.  
  167.  
  168. This software is provided free of charge. Copying and redistribution is
  169.  
  170. encouraged.
  171.  
  172.  
  173.  
  174. If you appreciate this software and you would like to support future
  175.  
  176. development please consider donating:
  177.  
  178. http://www.glassechidna.com.au/donate/
  179.  
  180.  
  181.  
  182. Initialising connection...
  183.  
  184. Detecting device...
  185.  
  186. Claiming interface...
  187.  
  188. Setting up interface...
  189.  
  190.  
  191.  
  192. Checking if protocol is initialised...
  193.  
  194. Protocol is not initialised.
  195.  
  196.  
  197.  
  198. Initialising protocol...
  199.  
  200. Protocol initialisation successful.
  201.  
  202.  
  203.  
  204. Beginning session...
  205.  
  206.  
  207.  
  208. This device may take up to 2 minutes to respond.
  209.  
  210. Please be patient!
  211.  
  212.  
  213.  
  214. Session begun.
  215.  
  216.  
  217.  
  218. Downloading device's PIT file...
  219.  
  220. PIT file download successful.
  221.  
  222.  
  223.  
  224. Uploading BOOT
  225.  
  226. 0%
  227. 
  228. 19%
  229. 
  230. 
  231. 38%
  232. 
  233. 
  234. 57%
  235. 
  236. 
  237. 76%
  238. 
  239. 
  240. 95%
  241. 
  242. 
  243. 100%
  244.  
  245. BOOT upload successful
  246.  
  247.  
  248.  
  249. Ending session...
  250.  
  251. Rebooting device...
  252.  
  253. Releasing device interface...
  254.  
  255.  
  256.  
  257. [INFO]
  258. [Heimdall Success]
  259.  
  260.  
  261. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  262. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  263. [INFO]Your device should be rebooting into Android now.
  264. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  265. [INFO]waiting for ADB device connection...
  266. [DEBUG]sending
  267. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  268. [DEBUG]return from ADB:
  269. [DEBUG]Ignoring commented line#Reboot to clear logs
  270. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  271. [DEBUG]sending
  272. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  273. mkdir failed for /data/local/tmp, File exists
  274.  
  275.  
  276. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  277.  
  278.  
  279. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  280. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  281. [INFO]Pushing dependencies
  282. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  283. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  284. [INFO]Pushing su binary...
  285. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  286. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\su" /data/local/tmp/
  287. [DEBUG]sending
  288. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  289. 884 KB/s (91980 bytes in 0.101s)
  290.  
  291. [DEBUG]return from ADB:884 KB/s (91980 bytes in 0.101s)
  292.  
  293. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  294. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  295. [INFO]Pushing SuperSU app...
  296. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  297. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\Superuser.apk" /data/local/tmp/
  298. [DEBUG]sending
  299. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  300. 5537 KB/s (996704 bytes in 0.175s)
  301.  
  302. [DEBUG]return from ADB:5537 KB/s (996704 bytes in 0.175s)
  303.  
  304. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  305. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  306. [INFO]Pushing Exynos-Abuse exploit
  307. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  308. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\exynos-abuse" /data/local/tmp/
  309. [DEBUG]sending
  310. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  311. 4023 KB/s (64373 bytes in 0.015s)
  312.  
  313. [DEBUG]return from ADB:4023 KB/s (64373 bytes in 0.015s)
  314.  
  315. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  316. [DEBUG]Received ECHO command$ECHO Pushing root script
  317. [INFO]Pushing root script
  318. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  319. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\rootGN.sh" /data/local/tmp/
  320. [DEBUG]sending
  321. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  322. 10 KB/s (361 bytes in 0.035s)
  323.  
  324. [DEBUG]return from ADB:10 KB/s (361 bytes in 0.035s)
  325.  
  326. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Busybox
  327. [DEBUG]Received ECHO command$ECHO Pushing Busybox
  328. [INFO]Pushing Busybox
  329. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEbusybox" /data/local/tmp/
  330. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\busybox" /data/local/tmp/
  331. [DEBUG]sending
  332. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  333. 3334 KB/s (1867568 bytes in 0.546s)
  334.  
  335. [DEBUG]return from ADB:3334 KB/s (1867568 bytes in 0.546s)
  336.  
  337. [DEBUG]SCRIPT COMMAND:$ECHO Pushing viewmem
  338. [DEBUG]Received ECHO command$ECHO Pushing viewmem
  339. [INFO]Pushing viewmem
  340. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEviewmem" /data/local/tmp/
  341. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\viewmem" /data/local/tmp/
  342. [DEBUG]sending
  343. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  344. 1354 KB/s (5417 bytes in 0.003s)
  345.  
  346. [DEBUG]return from ADB:1354 KB/s (5417 bytes in 0.003s)
  347.  
  348. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  349. [DEBUG]Received ECHO command$ECHO Pushing pit
  350. [INFO]Pushing pit
  351. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  352. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\exploit" /data/local/tmp/
  353. [DEBUG]sending
  354. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  355. 2048 KB/s (8192 bytes in 0.003s)
  356.  
  357. [DEBUG]return from ADB:2048 KB/s (8192 bytes in 0.003s)
  358.  
  359. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  360. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  361. [INFO]Setting Permissions....
  362. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  363. [DEBUG]sending
  364. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  365. [DEBUG]return from ADB:
  366. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  367. [DEBUG]sending
  368. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  369. [DEBUG]return from ADB:
  370. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  371. [DEBUG]sending
  372. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  373. [DEBUG]return from ADB:
  374. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  375. [DEBUG]sending
  376. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  377. [DEBUG]return from ADB:
  378. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  379. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  380. [INFO]Executing Root Exploit.
  381. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  382. [DEBUG]sending
  383. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  384. [*] s_show->seq_printf format string found at: 0xC086C348
  385.  
  386.  
  387. [*] sys_setresuid found at 0xC00967C4
  388.  
  389.  
  390. [*] patching sys_setresuid at 0xC0096808
  391.  
  392.  
  393. remounting system rw....
  394.  
  395.  
  396. moving su into position
  397.  
  398.  
  399. moving Superuser.apk into position
  400.  
  401.  
  402. [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
  403.  
  404. [*] sys_setresuid found at 0xC00967C4
  405.  
  406. [*] patching sys_setresuid at 0xC0096808
  407.  
  408. remounting system rw....
  409.  
  410. moving su into position
  411.  
  412. moving Superuser.apk into position
  413.  
  414.  
  415. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/viewmem; chmod 777 /data/local/tmp/busybox"
  416. [DEBUG]sending
  417. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  418. [DEBUG]return from ADB:
  419. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  420. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  421. [INFO][x]Ready for exploit
  422. [DEBUG]Ignoring commented line#Verify Device is proper
  423. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  424. [DEBUG]checking for results to be false
  425. [DEBUG]requesting shell "cat /proc/version"
  426. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  427. [DEBUG]sending
  428. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  429. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  430.  
  431.  
  432. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  433.  
  434.  
  435. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  436.  
  437.  
  438. [DEBUG]***NEW EVENT ADDED***
  439. [DEBUG]ON EVENT: noroot
  440. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  441. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  442. [DEBUG]sending
  443. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  444. [x]Found rooted device
  445.  
  446.  
  447. [DEBUG]return from ADB:[x]Found rooted device
  448.  
  449.  
  450. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  451. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  452. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  453. [INFO][x]Device Verification Checks Complete
  454. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  455. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  456. [INFO][x]Ready for exploit
  457. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  458. [DEBUG]Received ECHO command$ECHO Injecting Code
  459. [INFO]Injecting Code
  460. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  461. [DEBUG]sending
  462. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  463. 16+0 records in
  464.  
  465.  
  466. 16+0 records out
  467.  
  468.  
  469. 8192 bytes transferred in 0.002 secs (4096000 bytes/sec)
  470.  
  471.  
  472. [DEBUG]return from ADB:16+0 records in
  473.  
  474. 16+0 records out
  475.  
  476. 8192 bytes transferred in 0.002 secs (4096000 bytes/sec)
  477.  
  478.  
  479. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  480. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  481. [INFO][x]Exploit Injection Done.
  482. [DEBUG]SCRIPT COMMAND:reboot download
  483. [DEBUG]sending
  484. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\adb.exe###
  485. [DEBUG]return from ADB:
  486. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  487. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  488. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  489. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  490. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  491. [DEBUG]Received Command: flash --82 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  492. [DEBUG]verifying Heimdall deployment.
  493. [VERBOSE]detected!
  494. [INFO]Executing Heimdall command.
  495. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  496. [DEBUG]###executing real-time command: C:\Users\Tina\AppData\Local\Temp\TinaTEMPCASUALB32D4CCF\heimdall.exe###
  497. Waiting for Downoad Mode device.....Heimdall v1.4 RC2
  498.  
  499.  
  500.  
  501. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  502.  
  503. http://www.glassechidna.com.au/
  504.  
  505.  
  506.  
  507. This software is provided free of charge. Copying and redistribution is
  508.  
  509. encouraged.
  510.  
  511.  
  512.  
  513. If you appreciate this software and you would like to support future
  514.  
  515. development please consider donating:
  516.  
  517. http://www.glassechidna.com.au/donate/
  518.  
  519.  
  520.  
  521. Initialising connection...
  522.  
  523. Detecting device...
  524.  
  525. Claiming interface...
  526.  
  527. Setting up interface...
  528.  
  529.  
  530.  
  531. Checking if protocol is initialised...
  532.  
  533. Protocol is not initialised.
  534.  
  535.  
  536.  
  537. Initialising protocol...
  538.  
  539. Protocol initialisation successful.
  540.  
  541.  
  542.  
  543. Beginning session...
  544.  
  545.  
  546.  
  547. This device may take up to 2 minutes to respond.
  548.  
  549. Please be patient!
  550.  
  551.  
  552.  
  553. Session begun.
  554.  
  555.  
  556.  
  557. Downloading device's PIT file...
  558.  
  559. PIT file download successful.
  560.  
  561.  
  562.  
  563. Uploading recovery
  564.  
  565. 0%
  566. 
  567. 12%
  568. 
  569. 
  570. 25%
  571. 
  572. 
  573. 37%
  574. 
  575. 
  576. 50%
  577. 
  578. 
  579. 62%
  580. 
  581. 
  582. 75%
  583. 
  584. 
  585. 87%
  586. 
  587. 
  588. 100%
  589.  
  590. ERROR: Failed to confirm end of file transfer sequence!
  591.  
  592. ERROR: recovery upload failed!
  593.  
  594.  
  595.  
  596. Ending session...
  597.  
  598. ERROR: Failed to send end session packet!
  599.  
  600. Releasing device interface...
  601.  
  602.  
  603.  
  604. [ERROR]
  605. [Heimdall Error Report] Detected:
  606. Heimdall uncontinuable error; Script halted
  607. [/Heimdall Error Report]
  608.  
  609.  
  610. [DEBUG]HALT RECEIVED
  611. [DEBUG]Finishing remaining commands:$SENDLOG
  612. [DEBUG]Sendlog Command Issued!
  613. No remaining commands
  614. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement