Advertisement
Guest User

CASUAL 515b successfull attempt on VRAMC3

a guest
Sep 16th, 2014
232
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.22 KB | None | 0 0
  1. C:\Users\Sterling\Desktop>C:\Windows\System32\java.exe -jar "C:\Users\Sterling\Desktop\NoYouVerizon-GalaxyNote2-CASUAL R515.jar"
  2. [INFO]We are running Windows 8.1
  3. Creating Temp Folder in:C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  4. Revision:515 build:3,777
  5. CASUAL Copyright (C) 2013 Adam Outler
  6. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  7. and you are welcome to redistribute it, under certain conditions; run
  8. 'C:\Users\Sterling\Desktop\NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar --license'
  9. for details. http://android-casual.googlecode.com for source.
  10. [DEBUG]Picking Jar File:/C:/Users/Sterling/Desktop/NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar
  11. [DEBUG]Found Windows Computer
  12. [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
  13. [DEBUG]Attempting to write C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Elevate.exe
  14. [DEBUG]File verified.
  15. [DEBUG]Attempting to write C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe
  16. [DEBUG]File verified.
  17. [DEBUG]Attempting to write C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\AdbWinApi.dll
  18. [DEBUG]File verified.
  19. [DEBUG]Attempting to write C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\AdbWinUsbApi.dll
  20. [DEBUG]File verified.
  21. [DEBUG]sleeping for Windows ADB start
  22. [DEBUG]OMFGWOOT GUI running!
  23. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  24.  
  25. [DEBUG]Searching for scripts
  26. [DEBUG]Updating Scripts for UI
  27. [VERBOSE]From Resource: true
  28. [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
  29. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  30.  
  31. [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  32. [DEBUG]Exiting comboBoxUpdate()
  33. [DEBUG]attempted to lock controls but controls are not availble yet
  34. [DEBUG]Extracting archive....
  35. [DEBUG]Target Script Is resource
  36. [VERBOSE]Unzipping Superuser.apk
  37. [VERBOSE]Unzipping busybox
  38. [VERBOSE]Unzipping exploit
  39. [VERBOSE]Unzipping exynos-abuse
  40. [VERBOSE]Unzipping rootGN.sh
  41. [VERBOSE]Unzipping swagBoot
  42. [VERBOSE]Unzipping sch-i605-16gb.pit
  43. [VERBOSE]Unzipping sboot.bin
  44. [VERBOSE]Unzipping recoverThis
  45. [VERBOSE]Unzipping boot.img
  46. [VERBOSE]Unzipping su
  47. [VERBOSE]Unzip Complete
  48. [DEBUG]Attempting to write C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb_usb.ini
  49. [DEBUG]File verified.
  50. [DEBUG]###executing: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  51. [VERBOSE]List of devices attached
  52. [DEBUG]Device List:
  53. 42f71a015a249f5d device
  54.  
  55.  
  56.  
  57. [DEBUG]device
  58.  
  59. [DEBUG]State Change Detected, The new state is: 1
  60. [DEBUG]State Connected commanded
  61. [DEBUG]State Change Detected, The new state is: 0
  62. [DEBUG]State Disconnected commanded
  63. [DEBUG]State Change Detected, The new state is: 1
  64. [DEBUG]State Connected commanded
  65. [ERROR]
  66. [DEBUG]StartButtonActionPerformed() Script Activated
  67. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  68. [DEBUG]disk location for script resources
  69. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  70. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  71. [DEBUG]Lines in Script 64
  72. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@5fea6729
  73. [DEBUG]CASUAL has initiated a multithreaded execution environment
  74. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  75. [DEBUG]Reading datastreamjava.io.DataInputStream@5fea6729
  76. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  77. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  78. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  79. [INFO]Rebooting into download mode
  80. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  81. [DEBUG]sending
  82. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  83. [DEBUG]return from ADB:
  84. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  85. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  86. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  87. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  88. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  89. [DEBUG]Received Command: flash --pit "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  90. [DEBUG]verifying Heimdall deployment.
  91. [DEBUG]Attempting to write C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\libusb-1.0.dll
  92. [DEBUG]File verified.
  93. [DEBUG]Attempting to write C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\heimdall.exe
  94. [DEBUG]File verified.
  95. [VERBOSE]detected!
  96. [INFO]Executing Heimdall command.
  97. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  98. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\heimdall.exe###
  99. [INFO]
  100. [Heimdall Success]
  101.  
  102.  
  103. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  104. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  105. [INFO]Your device should be rebooting into Android now.
  106. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  107. [INFO]Waiting for ADB device connection. When Windows 8.1 recognizes the device, we will continue. Don't touch anything.
  108. [DEBUG]sending
  109. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  110. [DEBUG]return from ADB:
  111. [DEBUG]Ignoring commented line#Reboot to clear logs
  112. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  113. [DEBUG]sending
  114. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  115. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  116.  
  117.  
  118. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  119. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  120. [INFO]Pushing dependencies
  121. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  122. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  123. [INFO]Pushing su binary...
  124. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  125. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  126. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  127. [DEBUG]sending
  128. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  129. [DEBUG]return from ADB:963 KB/s (96260 bytes in 0.097s)
  130.  
  131. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  132. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  133. [INFO]Pushing SuperSU app...
  134. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  135. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  136. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  137. [DEBUG]sending
  138. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  139. [DEBUG]return from ADB:5452 KB/s (996704 bytes in 0.178s)
  140.  
  141. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  142. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  143. [INFO]Pushing Exynos-Abuse exploit
  144. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  145. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse exists
  146. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse" /data/local/tmp/
  147. [DEBUG]sending
  148. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  149. [DEBUG]return from ADB:5709 KB/s (64373 bytes in 0.011s)
  150.  
  151. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  152. [DEBUG]Received ECHO command$ECHO Pushing root script
  153. [INFO]Pushing root script
  154. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  155. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh exists
  156. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh" /data/local/tmp/
  157. [DEBUG]sending
  158. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  159. [DEBUG]return from ADB:176 KB/s (361 bytes in 0.002s)
  160.  
  161. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  162. [DEBUG]Received ECHO command$ECHO Pushing pit
  163. [INFO]Pushing pit
  164. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  165. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit exists
  166. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit" /data/local/tmp/
  167. [DEBUG]sending
  168. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  169. [DEBUG]return from ADB:2664 KB/s (8192 bytes in 0.003s)
  170.  
  171. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  172. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  173. [INFO]Setting Permissions....
  174. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  175. [DEBUG]sending
  176. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  177. [DEBUG]return from ADB:
  178. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  179. [DEBUG]sending
  180. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  181. [DEBUG]return from ADB:
  182. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  183. [DEBUG]sending
  184. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  185. [DEBUG]return from ADB:
  186. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  187. [DEBUG]sending
  188. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  189. [DEBUG]return from ADB:
  190. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  191. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  192. [INFO]Executing Root Exploit.
  193. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  194. [DEBUG]sending
  195. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  196. [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
  197.  
  198. [*] sys_setresuid found at 0xC00967C4
  199.  
  200. [*] patching sys_setresuid at 0xC0096808
  201.  
  202. remounting system rw....
  203.  
  204. moving su into position
  205.  
  206. moving Superuser.apk into position
  207.  
  208.  
  209. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  210. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  211. [INFO][x]Ready for exploit
  212. [DEBUG]Ignoring commented line#Verify Device is proper
  213. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  214. [DEBUG]checking for results to be false
  215. [DEBUG]requesting shell "cat /proc/version"
  216. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  217. [DEBUG]sending
  218. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  219. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  220.  
  221.  
  222. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  223.  
  224.  
  225. [DEBUG]***NEW EVENT ADDED***
  226. [DEBUG]ON EVENT: noroot
  227. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  228. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  229. [DEBUG]sending
  230. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  231. [DEBUG]return from ADB:[x]Found rooted device
  232.  
  233.  
  234. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  235. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  236. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  237. [INFO][x]Device Verification Checks Complete
  238. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  239. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  240. [INFO][x]Ready for exploit
  241. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  242. [DEBUG]Received ECHO command$ECHO Injecting Code
  243. [INFO]Injecting Code
  244. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  245. [DEBUG]sending
  246. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  247. [DEBUG]return from ADB:16+0 records in
  248.  
  249. 16+0 records out
  250.  
  251. 8192 bytes transferred in 0.027 secs (303407 bytes/sec)
  252.  
  253.  
  254. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  255. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  256. [INFO][x]Exploit Injection Done.
  257. [DEBUG]SCRIPT COMMAND:reboot download
  258. [DEBUG]sending
  259. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  260. [DEBUG]return from ADB:
  261. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  262. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  263. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  264. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  265. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot exists
  266. [VERBOSE]verified C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis exists
  267. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  268. [DEBUG]Received Command: flash --82 "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  269. [DEBUG]verifying Heimdall deployment.
  270. [VERBOSE]detected!
  271. [INFO]Executing Heimdall command.
  272. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  273. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\heimdall.exe###
  274. [INFO]
  275. [Heimdall Success]
  276.  
  277.  
  278. [DEBUG]SCRIPT COMMAND:$ECHO waiting for device
  279. [DEBUG]Received ECHO command$ECHO waiting for device
  280. [INFO]waiting for device
  281. [DEBUG]Ignoring commented line#END OF SCRIPT
  282. [DEBUG]SCRIPT COMMAND:wait-for-device
  283. [INFO]Waiting for ADB device connection. When Windows 8.1 recognizes the device, we will continue. Don't touch anything.
  284. [DEBUG]sending
  285. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  286. [DEBUG]return from ADB:
  287. [DEBUG]SCRIPT COMMAND:reboot recovery
  288. [DEBUG]sending
  289. [DEBUG]###executing real-time command: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  290. [DEBUG]return from ADB:
  291. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into recovery
  292. [DEBUG]Received ECHO command$ECHO Rebooting into recovery
  293. [INFO]Rebooting into recovery
  294. [DEBUG]SCRIPT COMMAND:$USERNOTIFICATION Congratulations, You should be unlocked!
  295. [INFO]done
  296. [INFO]Script Complete
  297. [DEBUG]State Change Detected, The new state is: 0
  298. [DEBUG]State Disconnected commanded
  299. [DEBUG]State Change Detected, The new state is: 1
  300. [DEBUG]State Connected commanded
  301. [DEBUG]State Change Detected, The new state is: 0
  302. [DEBUG]State Disconnected commanded
  303. [DEBUG]State Change Detected, The new state is: 1
  304. [DEBUG]State Connected commanded
  305. [DEBUG]###executing: C:\Users\Sterling\AppData\Local\Temp\SterlingTEMPCASUALDEF363B4\adb.exe###
  306. [VERBOSE]null
  307. [DEBUG]* daemon not running. starting it now on port 5037 *
  308. * daemon started successfully *
  309. unknown
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement