Guest User

CASUAL r465-mrbobo1

a guest
May 4th, 2013
69
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.17 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:465 build:3662
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\zNote2\Unlock%20Bootloader\BackAtchaVerizon-CASUAL-Revision465b.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Found Windows Computer
  10. [DEBUG]Picking Jar File:/C:/zNote2/Unlock%20Bootloader/BackAtchaVerizon-CASUAL-Revision465b.jar
  11. [DEBUG]Found: WindowsLinux Galaxy Note 2 Jailbreak
  12. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\Elevate.exe
  13. [DEBUG]File verified.
  14. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe
  15. [DEBUG]File verified.
  16. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\AdbWinApi.dll
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\AdbWinUsbApi.dll
  19. [DEBUG]File verified.
  20. [DEBUG]sleeping for Windows ADB start
  21. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb_usb.ini
  22. [DEBUG]File verified.
  23. [DEBUG]###executing: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  24. [VERBOSE]List of devices attached
  25. [DEBUG]Device List:
  26. 42f70c1c88ae9fbf device
  27.  
  28.  
  29.  
  30. [DEBUG]device
  31.  
  32. [DEBUG]Control Change requested but Statics.MasterLock is set.
  33. [DEBUG]OMFGWOOT GUI running!
  34. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  35.  
  36. [DEBUG]Searching for scripts
  37. [DEBUG]Updating Scripts for UI
  38. [VERBOSE]From Resource: true
  39. [INFO]--WindowsLinux Galaxy Note 2 Jailbreak--
  40. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  41.  
  42. [DEBUG]Created zipResource at /SCRIPTS/WindowsLinux Galaxy Note 2 Jailbreak.zip
  43. [DEBUG]Exiting comboBoxUpdate()
  44. [DEBUG]attempted to lock controls but controls are not availble yet
  45. [DEBUG]Extracting archive....
  46. [DEBUG]Target Script Is resource
  47. [VERBOSE]Unzipping Superuser.apk
  48. [VERBOSE]Unzipping boot.img
  49. [DEBUG]Control Change requested but Statics.MasterLock is set.
  50. [VERBOSE]Unzipping busybox
  51. [VERBOSE]Unzipping dependentinstaller.sh
  52. [VERBOSE]Unzipping exploit
  53. [VERBOSE]Unzipping exynos-abuse
  54. [VERBOSE]Unzipping recoverThis
  55. [VERBOSE]Unzipping rootGN.sh
  56. [VERBOSE]Unzipping su
  57. [VERBOSE]Unzipping swagBoot
  58. [VERBOSE]Unzipping viewmem
  59. [VERBOSE]Unzip Complete
  60. [DEBUG]State Change Detected, The new state is: 1
  61. [DEBUG]State Connected commanded
  62. [DEBUG]Controls Enabled status: true
  63. [ERROR]
  64. [DEBUG]StartButtonActionPerformed() Script Activated
  65. [DEBUG]Script known as WindowsLinux Galaxy Note 2 Jailbreak is running
  66. [DEBUG]Controls Enabled status: false
  67. [DEBUG]disk location for script resources
  68. [DEBUG]Loading internal resource: WindowsLinux Galaxy Note 2 Jailbreak
  69. [DEBUG]Selected resourceWindowsLinux Galaxy Note 2 Jailbreak
  70. [DEBUG]Lines in Script 66
  71. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@1aa1db8
  72. [DEBUG]CASUAL has initiated a multithreaded execution environment
  73. [DEBUG]***WEB VERSION***
  74. IDString:VERIZON GNOTE
  75. SVNRevision:376
  76. ScriptRevision:2
  77. supportURL:http://forum.xda-developers.com/showthread.php?t=2118348updateMessageUPDATE: Im not supporting old versions
  78. [DEBUG]Reading datastreamjava.io.DataInputStream@1aa1db8
  79. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the Back Atcha Verizon Odin Bootloader\n package for you.
  80. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  81. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  82. [INFO]Rebooting into download mode
  83. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  84. [DEBUG]sending
  85. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  86. [DEBUG]return from ADB:
  87. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --8 "$ZIPFILEboot.img"
  88. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --8 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  89. [DEBUG]Received Command: flash --8 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  90. [DEBUG]verifying Heimdall deployment.
  91. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\libusb-1.0.dll
  92. [DEBUG]File verified.
  93. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\heimdall.exe
  94. [DEBUG]File verified.
  95. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\msvcp110.dll
  96. [DEBUG]File verified.
  97. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\msvcr110.dll
  98. [DEBUG]File verified.
  99. [VERBOSE]detected!
  100. [INFO]Executing Heimdall command.
  101. [VERBOSE]Performing standard Heimdall commandflash --8 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  102. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\heimdall.exe###
  103. Waiting for Downoad Mode device.....Heimdall v1.4 RC2
  104.  
  105.  
  106.  
  107. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  108.  
  109. http://www.glassechidna.com.au/
  110.  
  111.  
  112.  
  113. This software is provided free of charge. Copying and redistribution is
  114.  
  115. encouraged.
  116.  
  117.  
  118.  
  119. If you appreciate this software and you would like to support future
  120.  
  121. development please consider donating:
  122.  
  123. http://www.glassechidna.com.au/donate/
  124.  
  125.  
  126.  
  127. Initialising connection...
  128.  
  129. Detecting device...
  130.  
  131. ERROR: Failed to access device. libusb error: -12
  132.  
  133. [ERROR]
  134. Drivers are Required Launching CADI.
  135. CASUAL Automated Driver Installer by jrloper.
  136. Installing Drivers now
  137. [VERBOSE]Driver Problems suck. Lemme make it easy.
  138. We're going to install drivers now. Lets do it.
  139. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\CADI.exe
  140. [DEBUG]File verified.
  141. [DEBUG]###executing: cmd.exe###
  142. [VERBOSE]null
  143. [INFO]
  144.  
  145. [INFO]
  146. [Heimdall Error Report] Detected:
  147. 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
  148. [/Heimdall Error Report]
  149.  
  150.  
  151. [VERBOSE]Performing standard Heimdall commandflash --8 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  152. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\heimdall.exe###
  153. Heimdall v1.4 RC2
  154.  
  155.  
  156.  
  157. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  158.  
  159. http://www.glassechidna.com.au/
  160.  
  161.  
  162.  
  163. This software is provided free of charge. Copying and redistribution is
  164.  
  165. encouraged.
  166.  
  167.  
  168.  
  169. If you appreciate this software and you would like to support future
  170.  
  171. development please consider donating:
  172.  
  173. http://www.glassechidna.com.au/donate/
  174.  
  175.  
  176.  
  177. Initialising connection...
  178.  
  179. Detecting device...
  180.  
  181. Claiming interface...
  182.  
  183. Setting up interface...
  184.  
  185.  
  186.  
  187. Checking if protocol is initialised...
  188.  
  189. Protocol is not initialised.
  190.  
  191.  
  192.  
  193. Initialising protocol...
  194.  
  195. Protocol initialisation successful.
  196.  
  197.  
  198.  
  199. Beginning session...
  200.  
  201.  
  202.  
  203. This device may take up to 2 minutes to respond.
  204.  
  205. Please be patient!
  206.  
  207.  
  208.  
  209. Session begun.
  210.  
  211.  
  212.  
  213. Downloading device's PIT file...
  214.  
  215. PIT file download successful.
  216.  
  217.  
  218.  
  219. Uploading BOOT
  220.  
  221. 0%
  222. 
  223. 19%
  224. 
  225. 
  226. 38%
  227. 
  228. 
  229. 57%
  230. 
  231. 
  232. 76%
  233. 
  234. 
  235. 95%
  236. 
  237. 
  238. 100%
  239.  
  240. BOOT upload successful
  241.  
  242.  
  243.  
  244. Ending session...
  245.  
  246. Rebooting device...
  247.  
  248. Releasing device interface...
  249.  
  250.  
  251.  
  252. [INFO]
  253. [Heimdall Success]
  254.  
  255.  
  256. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  257. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  258. [INFO]Your device should be rebooting into Android now.
  259. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  260. [INFO]waiting for ADB device connection...
  261. [DEBUG]sending
  262. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  263. [DEBUG]return from ADB:
  264. [DEBUG]Ignoring commented line#Reboot to clear logs
  265. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  266. [DEBUG]sending
  267. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  268. mkdir failed for /data/local/tmp, File exists
  269.  
  270.  
  271. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  272.  
  273.  
  274. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  275. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  276. [INFO]Pushing dependencies
  277. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  278. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  279. [INFO]Pushing su binary...
  280. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  281. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\su" /data/local/tmp/
  282. [DEBUG]sending
  283. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  284. 3454 KB/s (91980 bytes in 0.026s)
  285.  
  286. [DEBUG]return from ADB:3454 KB/s (91980 bytes in 0.026s)
  287.  
  288. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  289. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  290. [INFO]Pushing SuperSU app...
  291. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  292. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\Superuser.apk" /data/local/tmp/
  293. [DEBUG]sending
  294. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  295. 4505 KB/s (996704 bytes in 0.216s)
  296.  
  297. [DEBUG]return from ADB:4505 KB/s (996704 bytes in 0.216s)
  298.  
  299. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  300. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  301. [INFO]Pushing Exynos-Abuse exploit
  302. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  303. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\exynos-abuse" /data/local/tmp/
  304. [DEBUG]sending
  305. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  306. 2619 KB/s (64373 bytes in 0.024s)
  307.  
  308. [DEBUG]return from ADB:2619 KB/s (64373 bytes in 0.024s)
  309.  
  310. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  311. [DEBUG]Received ECHO command$ECHO Pushing root script
  312. [INFO]Pushing root script
  313. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  314. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\rootGN.sh" /data/local/tmp/
  315. [DEBUG]sending
  316. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  317. 176 KB/s (361 bytes in 0.002s)
  318.  
  319. [DEBUG]return from ADB:176 KB/s (361 bytes in 0.002s)
  320.  
  321. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Busybox
  322. [DEBUG]Received ECHO command$ECHO Pushing Busybox
  323. [INFO]Pushing Busybox
  324. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEbusybox" /data/local/tmp/
  325. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\busybox" /data/local/tmp/
  326. [DEBUG]sending
  327. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  328. 4469 KB/s (1867568 bytes in 0.408s)
  329.  
  330. [DEBUG]return from ADB:4469 KB/s (1867568 bytes in 0.408s)
  331.  
  332. [DEBUG]SCRIPT COMMAND:$ECHO Pushing viewmem
  333. [DEBUG]Received ECHO command$ECHO Pushing viewmem
  334. [INFO]Pushing viewmem
  335. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEviewmem" /data/local/tmp/
  336. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\viewmem" /data/local/tmp/
  337. [DEBUG]sending
  338. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  339. 1057 KB/s (5417 bytes in 0.005s)
  340.  
  341. [DEBUG]return from ADB:1057 KB/s (5417 bytes in 0.005s)
  342.  
  343. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  344. [DEBUG]Received ECHO command$ECHO Pushing pit
  345. [INFO]Pushing pit
  346. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  347. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\exploit" /data/local/tmp/
  348. [DEBUG]sending
  349. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  350. 1600 KB/s (8192 bytes in 0.005s)
  351.  
  352. [DEBUG]return from ADB:1600 KB/s (8192 bytes in 0.005s)
  353.  
  354. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  355. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  356. [INFO]Setting Permissions....
  357. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  358. [DEBUG]sending
  359. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  360. [DEBUG]return from ADB:
  361. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  362. [DEBUG]sending
  363. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  364. [DEBUG]return from ADB:
  365. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  366. [DEBUG]sending
  367. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  368. [DEBUG]return from ADB:
  369. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  370. [DEBUG]sending
  371. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  372. [DEBUG]return from ADB:
  373. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  374. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  375. [INFO]Executing Root Exploit.
  376. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  377. [DEBUG]sending
  378. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  379. [*] s_show->seq_printf format string found at: 0xC086C348
  380.  
  381.  
  382. [*] sys_setresuid found at 0xC00967C4
  383.  
  384.  
  385. [*] patching sys_setresuid at 0xC0096808
  386.  
  387.  
  388. remounting system rw....
  389.  
  390.  
  391. moving su into position
  392.  
  393.  
  394. moving Superuser.apk into position
  395.  
  396.  
  397. [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
  398.  
  399. [*] sys_setresuid found at 0xC00967C4
  400.  
  401. [*] patching sys_setresuid at 0xC0096808
  402.  
  403. remounting system rw....
  404.  
  405. moving su into position
  406.  
  407. moving Superuser.apk into position
  408.  
  409.  
  410. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/viewmem; chmod 777 /data/local/tmp/busybox"
  411. [DEBUG]sending
  412. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  413. [DEBUG]return from ADB:
  414. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  415. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  416. [INFO][x]Ready for exploit
  417. [DEBUG]Ignoring commented line#Verify Device is proper
  418. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  419. [DEBUG]checking for results to be false
  420. [DEBUG]requesting shell "cat /proc/version"
  421. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  422. [DEBUG]sending
  423. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  424. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  425.  
  426.  
  427. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  428.  
  429.  
  430. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  431.  
  432.  
  433. [DEBUG]***NEW EVENT ADDED***
  434. [DEBUG]ON EVENT: noroot
  435. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  436. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  437. [DEBUG]sending
  438. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  439. [x]Found rooted device
  440.  
  441.  
  442. [DEBUG]return from ADB:[x]Found rooted device
  443.  
  444.  
  445. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  446. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  447. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  448. [INFO][x]Device Verification Checks Complete
  449. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  450. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  451. [INFO][x]Ready for exploit
  452. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  453. [DEBUG]Received ECHO command$ECHO Injecting Code
  454. [INFO]Injecting Code
  455. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  456. [DEBUG]sending
  457. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  458. 16+0 records in
  459.  
  460.  
  461. 16+0 records out
  462.  
  463.  
  464. 8192 bytes transferred in 0.002 secs (4096000 bytes/sec)
  465.  
  466.  
  467. [DEBUG]return from ADB:16+0 records in
  468.  
  469. 16+0 records out
  470.  
  471. 8192 bytes transferred in 0.002 secs (4096000 bytes/sec)
  472.  
  473.  
  474. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  475. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  476. [INFO][x]Exploit Injection Done.
  477. [DEBUG]SCRIPT COMMAND:reboot download
  478. [DEBUG]sending
  479. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\adb.exe###
  480. [DEBUG]return from ADB:
  481. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  482. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  483. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  484. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  485. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  486. [DEBUG]Received Command: flash --82 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  487. [DEBUG]verifying Heimdall deployment.
  488. [VERBOSE]detected!
  489. [INFO]Executing Heimdall command.
  490. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  491. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\heimdall.exe###
  492. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  493.  
  494.  
  495.  
  496. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  497.  
  498. http://www.glassechidna.com.au/
  499.  
  500.  
  501.  
  502. This software is provided free of charge. Copying and redistribution is
  503.  
  504. encouraged.
  505.  
  506.  
  507.  
  508. If you appreciate this software and you would like to support future
  509.  
  510. development please consider donating:
  511.  
  512. http://www.glassechidna.com.au/donate/
  513.  
  514.  
  515.  
  516. Initialising connection...
  517.  
  518. Detecting device...
  519.  
  520. ERROR: Failed to access device. libusb error: -12
  521.  
  522. [ERROR]
  523. Drivers are Required Launching CADI.
  524. CASUAL Automated Driver Installer by jrloper.
  525. Installing Drivers now
  526. [VERBOSE]Driver Problems suck. Lemme make it easy.
  527. We're going to install drivers now. Lets do it.
  528. [DEBUG]Attempting to write C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\CADI.exe
  529. [DEBUG]File verified.
  530. [DEBUG]###executing: cmd.exe###
  531. [VERBOSE]null
  532. [INFO]
  533.  
  534. [INFO]
  535. [Heimdall Error Report] Detected:
  536. 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
  537. [/Heimdall Error Report]
  538.  
  539.  
  540. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  541. [DEBUG]###executing real-time command: C:\Users\Molly\AppData\Local\Temp\MollyTEMPCASUAL24E2E5FC\heimdall.exe###
  542. Heimdall v1.4 RC2
  543.  
  544.  
  545.  
  546. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  547.  
  548. http://www.glassechidna.com.au/
  549.  
  550.  
  551.  
  552. This software is provided free of charge. Copying and redistribution is
  553.  
  554. encouraged.
  555.  
  556.  
  557.  
  558. If you appreciate this software and you would like to support future
  559.  
  560. development please consider donating:
  561.  
  562. http://www.glassechidna.com.au/donate/
  563.  
  564.  
  565.  
  566. Initialising connection...
  567.  
  568. Detecting device...
  569.  
  570. Claiming interface...
  571.  
  572. Setting up interface...
  573.  
  574.  
  575.  
  576. Checking if protocol is initialised...
  577.  
  578. Protocol is not initialised.
  579.  
  580.  
  581.  
  582. Initialising protocol...
  583.  
  584. Protocol initialisation successful.
  585.  
  586.  
  587.  
  588. Beginning session...
  589.  
  590.  
  591.  
  592. This device may take up to 2 minutes to respond.
  593.  
  594. Please be patient!
  595.  
  596.  
  597.  
  598. Session begun.
  599.  
  600.  
  601.  
  602. Downloading device's PIT file...
  603.  
  604. PIT file download successful.
  605.  
  606.  
  607.  
  608. Uploading recovery
  609.  
  610. 0%
  611. 
  612. 12%
  613. 
  614. 
  615. 25%
  616. 
  617. 
  618. 37%
  619. 
  620. 
  621. 50%
  622. 
  623. 
  624. 62%
  625. 
  626. 
  627. 75%
  628. 
  629. 
  630. 87%
  631. 
  632. 
  633. 100%
  634.  
  635. ERROR: Failed to confirm end of file transfer sequence!
  636.  
  637. ERROR: recovery upload failed!
  638.  
  639.  
  640.  
  641. Ending session...
  642.  
  643. ERROR: Failed to send end session packet!
  644.  
  645. Releasing device interface...
  646.  
  647.  
  648.  
  649. [ERROR]
  650. [Heimdall Error Report] Detected:
  651. Heimdall uncontinuable error; Script halted
  652. [/Heimdall Error Report]
  653.  
  654.  
  655. [DEBUG]HALT RECEIVED
  656. [DEBUG]Finishing remaining commands:$SENDLOG
  657. [DEBUG]Sendlog Command Issued!
  658. No remaining commands
  659. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment