Advertisement
Guest User

CASUAL r515-

a guest
Jul 3rd, 2016
388
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.45 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:515 build:3,777
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\Rob\Downloads\NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Picking Jar File:/C:/Users/Rob/Downloads/NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar
  10. [DEBUG]Found Windows Computer
  11. [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
  12. [DEBUG]Attempting to write C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Elevate.exe
  13. [DEBUG]File verified.
  14. [DEBUG]Attempting to write C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe
  15. [DEBUG]File verified.
  16. [DEBUG]Attempting to write C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\AdbWinApi.dll
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\AdbWinUsbApi.dll
  19. [DEBUG]File verified.
  20. [DEBUG]sleeping for Windows ADB start
  21. [DEBUG]Attempting to write C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb_usb.ini
  22. [DEBUG]File verified.
  23. [DEBUG]###executing: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  24. [VERBOSE]* daemon not running. starting it now on port 5037 *
  25. [DEBUG]Device List:
  26. ADB server didn't ACK
  27. * failed to start daemon *
  28. error: cannot connect to daemon
  29.  
  30.  
  31. [DEBUG]OMFGWOOT GUI running!
  32. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  33.  
  34. [DEBUG]Searching for scripts
  35. [DEBUG]Updating Scripts for UI
  36. [VERBOSE]From Resource: true
  37. [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
  38. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  39.  
  40. [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  41. [DEBUG]Exiting comboBoxUpdate()
  42. [DEBUG]attempted to lock controls but controls are not availble yet
  43. [DEBUG]Extracting archive....
  44. [DEBUG]Target Script Is resource
  45. [VERBOSE]Unzipping Superuser.apk
  46. [VERBOSE]Unzipping busybox
  47. [VERBOSE]Unzipping exploit
  48. [VERBOSE]Unzipping exynos-abuse
  49. [VERBOSE]Unzipping rootGN.sh
  50. [VERBOSE]Unzipping swagBoot
  51. [VERBOSE]Unzipping sch-i605-16gb.pit
  52. [VERBOSE]Unzipping sboot.bin
  53. [VERBOSE]Unzipping recoverThis
  54. [VERBOSE]Unzipping boot.img
  55. [VERBOSE]Unzipping su
  56. [DEBUG]adb server is out of date. killing...
  57. could not read ok from ADB Server, error = 109
  58. * failed to start daemon *
  59. error:
  60.  
  61. [VERBOSE]Unzip Complete
  62. [DEBUG]State Change Detected, The new state is: 1
  63. [DEBUG]State Connected commanded
  64. [ERROR]
  65. [DEBUG]StartButtonActionPerformed() Script Activated
  66. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  67. [DEBUG]disk location for script resources
  68. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  69. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  70. [DEBUG]Lines in Script 64
  71. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@114b320d
  72. [DEBUG]CASUAL has initiated a multithreaded execution environment
  73. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  74. [DEBUG]Reading datastreamjava.io.DataInputStream@114b320d
  75. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  76. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  77. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  78. [INFO]Rebooting into download mode
  79. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  80. [DEBUG]sending
  81. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  82. [DEBUG]return from ADB:
  83. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  84. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  85. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  86. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  87. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  88. [DEBUG]Received Command: flash --pit "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  89. [DEBUG]verifying Heimdall deployment.
  90. [DEBUG]Attempting to write C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\libusb-1.0.dll
  91. [DEBUG]File verified.
  92. [DEBUG]Attempting to write C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\heimdall.exe
  93. [DEBUG]File verified.
  94. [VERBOSE]detected!
  95. [INFO]Executing Heimdall command.
  96. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  97. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\heimdall.exe###
  98. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  99.  
  100.  
  101.  
  102. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  103.  
  104. http://www.glassechidna.com.au/
  105.  
  106.  
  107.  
  108. This software is provided free of charge. Copying and redistribution is
  109.  
  110. encouraged.
  111.  
  112.  
  113.  
  114. If you appreciate this software and you would like to support future
  115.  
  116. development please consider donating:
  117.  
  118. http://www.glassechidna.com.au/donate/
  119.  
  120.  
  121.  
  122. Initialising connection...
  123.  
  124. Detecting device...
  125.  
  126. Claiming interface...
  127.  
  128. Setting up interface...
  129.  
  130.  
  131.  
  132. Checking if protocol is initialised...
  133.  
  134. Protocol is not initialised.
  135.  
  136.  
  137.  
  138. Initialising protocol...
  139.  
  140. Protocol initialisation successful.
  141.  
  142.  
  143.  
  144. Beginning session...
  145.  
  146.  
  147.  
  148. This device may take up to 2 minutes to respond.
  149.  
  150. Please be patient!
  151.  
  152.  
  153.  
  154. Session begun.
  155.  
  156.  
  157.  
  158. Uploading PIT
  159.  
  160. PIT upload successful
  161.  
  162.  
  163.  
  164. Uploading BOOTLOADER
  165.  
  166. 0%
  167. 
  168. 100%
  169.  
  170. BOOTLOADER upload successful
  171.  
  172.  
  173.  
  174. Uploading BOOT
  175.  
  176. 0%
  177. 
  178. 19%
  179. 
  180. 
  181. 38%
  182. 
  183. 
  184. 57%
  185. 
  186. 
  187. 76%
  188. 
  189. 
  190. 95%
  191. 
  192. 
  193. 100%
  194.  
  195. BOOT upload successful
  196.  
  197.  
  198.  
  199. Ending session...
  200.  
  201. Rebooting device...
  202.  
  203. Releasing device interface...
  204.  
  205.  
  206.  
  207. [INFO]
  208. [Heimdall Success]
  209.  
  210.  
  211. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  212. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  213. [INFO]Your device should be rebooting into Android now.
  214. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  215. [INFO]Waiting for ADB device connection. When Windows 7 recognizes the device, we will continue. Don't touch anything.
  216. [DEBUG]sending
  217. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  218. [DEBUG]return from ADB:
  219. [DEBUG]Ignoring commented line#Reboot to clear logs
  220. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  221. [DEBUG]sending
  222. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  223. mkdir failed for /data/local/tmp, File exists
  224.  
  225.  
  226. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  227.  
  228.  
  229. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  230. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  231. [INFO]Pushing dependencies
  232. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  233. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  234. [INFO]Pushing su binary...
  235. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  236. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  237. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  238. [DEBUG]sending
  239. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  240. 3481 KB/s (96260 bytes in 0.027s)
  241.  
  242. [DEBUG]return from ADB:3481 KB/s (96260 bytes in 0.027s)
  243.  
  244. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  245. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  246. [INFO]Pushing SuperSU app...
  247. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  248. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  249. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  250. [DEBUG]sending
  251. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  252. 4055 KB/s (996704 bytes in 0.240s)
  253.  
  254. [DEBUG]return from ADB:4055 KB/s (996704 bytes in 0.240s)
  255.  
  256. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  257. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  258. [INFO]Pushing Exynos-Abuse exploit
  259. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  260. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse exists
  261. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse" /data/local/tmp/
  262. [DEBUG]sending
  263. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  264. 4490 KB/s (64373 bytes in 0.014s)
  265.  
  266. [DEBUG]return from ADB:4490 KB/s (64373 bytes in 0.014s)
  267.  
  268. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  269. [DEBUG]Received ECHO command$ECHO Pushing root script
  270. [INFO]Pushing root script
  271. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  272. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh exists
  273. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh" /data/local/tmp/
  274. [DEBUG]sending
  275. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  276. 176 KB/s (361 bytes in 0.002s)
  277.  
  278. [DEBUG]return from ADB:176 KB/s (361 bytes in 0.002s)
  279.  
  280. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  281. [DEBUG]Received ECHO command$ECHO Pushing pit
  282. [INFO]Pushing pit
  283. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  284. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit exists
  285. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit" /data/local/tmp/
  286. [DEBUG]sending
  287. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  288. 2000 KB/s (8192 bytes in 0.004s)
  289.  
  290. [DEBUG]return from ADB:2000 KB/s (8192 bytes in 0.004s)
  291.  
  292. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  293. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  294. [INFO]Setting Permissions....
  295. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  296. [DEBUG]sending
  297. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  298. [DEBUG]return from ADB:
  299. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  300. [DEBUG]sending
  301. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  302. [DEBUG]return from ADB:
  303. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  304. [DEBUG]sending
  305. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  306. [DEBUG]return from ADB:
  307. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  308. [DEBUG]sending
  309. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  310. [DEBUG]return from ADB:
  311. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  312. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  313. [INFO]Executing Root Exploit.
  314. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  315. [DEBUG]sending
  316. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  317. [*] s_show->seq_printf format string found at: 0xC086C348
  318.  
  319.  
  320. [*] sys_setresuid found at 0xC00967C4
  321.  
  322.  
  323. [*] patching sys_setresuid at 0xC0096808
  324.  
  325.  
  326. remounting system rw....
  327.  
  328.  
  329. moving su into position
  330.  
  331.  
  332. moving Superuser.apk into position
  333.  
  334.  
  335. [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
  336.  
  337. [*] sys_setresuid found at 0xC00967C4
  338.  
  339. [*] patching sys_setresuid at 0xC0096808
  340.  
  341. remounting system rw....
  342.  
  343. moving su into position
  344.  
  345. moving Superuser.apk into position
  346.  
  347.  
  348. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  349. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  350. [INFO][x]Ready for exploit
  351. [DEBUG]Ignoring commented line#Verify Device is proper
  352. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  353. [DEBUG]checking for results to be false
  354. [DEBUG]requesting shell "cat /proc/version"
  355. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  356. [DEBUG]sending
  357. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  358. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  359.  
  360.  
  361. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  362.  
  363.  
  364. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  365.  
  366.  
  367. [DEBUG]***NEW EVENT ADDED***
  368. [DEBUG]ON EVENT: noroot
  369. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  370. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  371. [DEBUG]sending
  372. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  373. [x]Found rooted device
  374.  
  375.  
  376. [DEBUG]return from ADB:[x]Found rooted device
  377.  
  378.  
  379. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  380. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  381. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  382. [INFO][x]Device Verification Checks Complete
  383. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  384. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  385. [INFO][x]Ready for exploit
  386. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  387. [DEBUG]Received ECHO command$ECHO Injecting Code
  388. [INFO]Injecting Code
  389. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  390. [DEBUG]sending
  391. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  392. [DEBUG]return from ADB:
  393. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  394. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  395. [INFO][x]Exploit Injection Done.
  396. [DEBUG]SCRIPT COMMAND:reboot download
  397. [DEBUG]sending
  398. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\adb.exe###
  399. [DEBUG]return from ADB:
  400. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  401. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  402. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  403. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  404. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot exists
  405. [VERBOSE]verified C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis exists
  406. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  407. [DEBUG]Received Command: flash --82 "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  408. [DEBUG]verifying Heimdall deployment.
  409. [VERBOSE]detected!
  410. [INFO]Executing Heimdall command.
  411. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  412. [DEBUG]###executing real-time command: C:\Users\Rob\AppData\Local\Temp\RobTEMPCASUALF6F34D17\heimdall.exe###
  413. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  414.  
  415.  
  416.  
  417. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  418.  
  419. http://www.glassechidna.com.au/
  420.  
  421.  
  422.  
  423. This software is provided free of charge. Copying and redistribution is
  424.  
  425. encouraged.
  426.  
  427.  
  428.  
  429. If you appreciate this software and you would like to support future
  430.  
  431. development please consider donating:
  432.  
  433. http://www.glassechidna.com.au/donate/
  434.  
  435.  
  436.  
  437. Initialising connection...
  438.  
  439. Detecting device...
  440.  
  441. Claiming interface...
  442.  
  443. Setting up interface...
  444.  
  445.  
  446.  
  447. Checking if protocol is initialised...
  448.  
  449. Protocol is not initialised.
  450.  
  451.  
  452.  
  453. Initialising protocol...
  454.  
  455. Protocol initialisation successful.
  456.  
  457.  
  458.  
  459. Beginning session...
  460.  
  461.  
  462.  
  463. This device may take up to 2 minutes to respond.
  464.  
  465. Please be patient!
  466.  
  467.  
  468.  
  469. Session begun.
  470.  
  471.  
  472.  
  473. Downloading device's PIT file...
  474.  
  475. PIT file download successful.
  476.  
  477.  
  478.  
  479. ERROR: No partition with identifier "60" exists in the specified PIT.
  480.  
  481. Ending session...
  482.  
  483. Rebooting device...
  484.  
  485. Releasing device interface...
  486.  
  487.  
  488.  
  489. [ERROR]
  490. [Heimdall Error Report] Detected:
  491. Heimdall uncontinuable error; Script halted
  492. [/Heimdall Error Report]
  493.  
  494.  
  495. [DEBUG]HALT RECEIVED
  496. [DEBUG]Finishing remaining commands:$SENDLOG
  497. [DEBUG]Sendlog Command Issued!
  498. No remaining commands
  499. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement