Advertisement
Guest User

CASUAL r478-mmoorman12

a guest
May 10th, 2013
678
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 21.29 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:478 build:3667
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\mmoorm1\Downloads\Android\GalaxyNoteII_I605\NoYouVerizon-CASUAL-Revision478b.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Picking Jar File:/C:/Users/mmoorm1/Downloads/Android/GalaxyNoteII_I605/NoYouVerizon-CASUAL-Revision478b.jar
  10. [DEBUG]Found Windows Computer
  11. [DEBUG]Attempting to write C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Elevate.exe
  12. [DEBUG]File verified.
  13. [DEBUG]Attempting to write C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe
  14. [DEBUG]File verified.
  15. [DEBUG]Attempting to write C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\AdbWinApi.dll
  16. [DEBUG]File verified.
  17. [DEBUG]Attempting to write C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\AdbWinUsbApi.dll
  18. [DEBUG]File verified.
  19. [DEBUG]sleeping for Windows ADB start
  20. [DEBUG]Attempting to write C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb_usb.ini
  21. [DEBUG]File verified.
  22. [DEBUG]###executing: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  23. [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
  24. [VERBOSE]* daemon not running. starting it now on port 5037 *
  25. [DEBUG]Device List:
  26. ADB server didn't ACK
  27. * failed to start daemon *
  28. error: cannot connect to daemon
  29.  
  30.  
  31. [DEBUG]* daemon not running. starting it now on port 5037 *
  32. ADB server didn't ACK
  33. * failed to start daemon *
  34. error: cannot connect to daemon
  35.  
  36. [DEBUG]State Change Detected, The new state is: 1
  37. [DEBUG]State Connected commanded
  38. [DEBUG]State Change Detected, The new state is: 1
  39. [DEBUG]State Connected commanded
  40. [DEBUG]State Change Detected, The new state is: 1
  41. [DEBUG]State Connected commanded
  42. [DEBUG]State Change Detected, The new state is: 1
  43. [DEBUG]State Connected commanded
  44. [DEBUG]State Change Detected, The new state is: 1
  45. [DEBUG]State Connected commanded
  46. [DEBUG]State Change Detected, The new state is: 1
  47. [DEBUG]State Connected commanded
  48. [DEBUG]State Change Detected, The new state is: 1
  49. [DEBUG]State Connected commanded
  50. [DEBUG]State Change Detected, The new state is: 1
  51. [DEBUG]State Connected commanded
  52. [DEBUG]Control Change requested but Statics.MasterLock is set.
  53. [DEBUG]OMFGWOOT GUI running!
  54. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  55.  
  56. [DEBUG]Searching for scripts
  57. [DEBUG]Updating Scripts for UI
  58. [VERBOSE]From Resource: true
  59. [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
  60. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  61.  
  62. [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  63. [DEBUG]Exiting comboBoxUpdate()
  64. [DEBUG]attempted to lock controls but controls are not availble yet
  65. [DEBUG]Extracting archive....
  66. [DEBUG]Target Script Is resource
  67. [VERBOSE]Unzipping Superuser.apk
  68. [VERBOSE]Unzipping busybox
  69. [VERBOSE]Unzipping exploit
  70. [VERBOSE]Unzipping exynos-abuse
  71. [DEBUG]State Change Detected, The new state is: 1
  72. [DEBUG]State Connected commanded
  73. [DEBUG]Control Change requested but Statics.MasterLock is set.
  74. [DEBUG]Control Change requested but Statics.MasterLock is set.
  75. [DEBUG]Control Change requested but Statics.MasterLock is set.
  76. [VERBOSE]Unzipping rootGN.sh
  77. [VERBOSE]Unzipping su
  78. [VERBOSE]Unzipping swagBoot
  79. [VERBOSE]Unzipping sch-i605-16gb.pit
  80. [VERBOSE]Unzipping sboot.bin
  81. [VERBOSE]Unzipping recoverThis
  82. [VERBOSE]Unzipping boot.img
  83. [VERBOSE]Unzip Complete
  84. [DEBUG]State Change Detected, The new state is: 1
  85. [DEBUG]State Connected commanded
  86. [DEBUG]Controls Enabled status: true
  87. [ERROR]
  88. [DEBUG]StartButtonActionPerformed() Script Activated
  89. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  90. [DEBUG]Controls Enabled status: false
  91. [DEBUG]disk location for script resources
  92. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  93. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  94. [DEBUG]Lines in Script 64
  95. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@723646
  96. [DEBUG]CASUAL has initiated a multithreaded execution environment
  97. [DEBUG]***WEB VERSION***
  98. IDString:VERIZON GNOTE
  99. SVNRevision:478
  100. ScriptRevision:2
  101. supportURL:http://forum.xda-developers.com/showthread.php?t=2118348updateMessageUPDATE: new
  102. [DEBUG]Reading datastreamjava.io.DataInputStream@723646
  103. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  104. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  105. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  106. [INFO]Rebooting into download mode
  107. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  108. [DEBUG]sending
  109. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  110. [DEBUG]return from ADB:
  111. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  112. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  113. [DEBUG]Received Command: flash --pit "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  114. [DEBUG]verifying Heimdall deployment.
  115. [DEBUG]Attempting to write C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\libusb-1.0.dll
  116. [DEBUG]File verified.
  117. [DEBUG]Attempting to write C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\heimdall.exe
  118. [DEBUG]File verified.
  119. [VERBOSE]detected!
  120. [INFO]Executing Heimdall command.
  121. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  122. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\heimdall.exe###
  123. Waiting for Downoad Mode device...Heimdall v1.4 RC2
  124.  
  125.  
  126.  
  127. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  128.  
  129. http://www.glassechidna.com.au/
  130.  
  131.  
  132.  
  133. This software is provided free of charge. Copying and redistribution is
  134.  
  135. encouraged.
  136.  
  137.  
  138.  
  139. If you appreciate this software and you would like to support future
  140.  
  141. development please consider donating:
  142.  
  143. http://www.glassechidna.com.au/donate/
  144.  
  145.  
  146.  
  147. Initialising connection...
  148.  
  149. Detecting device...
  150.  
  151. ERROR: Failed to access device. libusb error: -12
  152.  
  153. [ERROR]
  154. Drivers are Required Launching CADI.
  155. CASUAL Automated Driver Installer by jrloper.
  156. Installing Drivers now
  157. [VERBOSE]Driver Problems suck. Lemme make it easy.
  158. We're going to install drivers now. Lets do it.
  159. [DEBUG]Attempting to write C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\CADI.exe
  160. [DEBUG]File verified.
  161. [DEBUG]###executing: cmd.exe###
  162. [VERBOSE]null
  163. [INFO]
  164.  
  165. [INFO]
  166. [Heimdall Error Report] Detected:
  167. 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
  168. [/Heimdall Error Report]
  169.  
  170.  
  171. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  172. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\heimdall.exe###
  173. Heimdall v1.4 RC2
  174.  
  175.  
  176.  
  177. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  178.  
  179. http://www.glassechidna.com.au/
  180.  
  181.  
  182.  
  183. This software is provided free of charge. Copying and redistribution is
  184.  
  185. encouraged.
  186.  
  187.  
  188.  
  189. If you appreciate this software and you would like to support future
  190.  
  191. development please consider donating:
  192.  
  193. http://www.glassechidna.com.au/donate/
  194.  
  195.  
  196.  
  197. Initialising connection...
  198.  
  199. Detecting device...
  200.  
  201. Claiming interface...
  202.  
  203. Setting up interface...
  204.  
  205.  
  206.  
  207. Checking if protocol is initialised...
  208.  
  209. Protocol is not initialised.
  210.  
  211.  
  212.  
  213. Initialising protocol...
  214.  
  215. Protocol initialisation successful.
  216.  
  217.  
  218.  
  219. Beginning session...
  220.  
  221.  
  222.  
  223. This device may take up to 2 minutes to respond.
  224.  
  225. Please be patient!
  226.  
  227.  
  228.  
  229. Session begun.
  230.  
  231.  
  232.  
  233. Uploading PIT
  234.  
  235. PIT upload successful
  236.  
  237.  
  238.  
  239. Uploading BOOTLOADER
  240.  
  241. 0%
  242. 
  243. 100%
  244.  
  245. BOOTLOADER upload successful
  246.  
  247.  
  248.  
  249. Uploading BOOT
  250.  
  251. 0%
  252. 
  253. 19%
  254. 
  255. 
  256. 38%
  257. 
  258. 
  259. 57%
  260. 
  261. 
  262. 76%
  263. 
  264. 
  265. 95%
  266. 
  267. 
  268. 100%
  269.  
  270. BOOT upload successful
  271.  
  272.  
  273.  
  274. Ending session...
  275.  
  276. Rebooting device...
  277.  
  278. Releasing device interface...
  279.  
  280.  
  281.  
  282. [INFO]
  283. [Heimdall Success]
  284.  
  285.  
  286. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  287. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  288. [INFO]Your device should be rebooting into Android now.
  289. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  290. [INFO]waiting for ADB device connection...
  291. [DEBUG]sending
  292. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  293. [DEBUG]return from ADB:
  294. [DEBUG]Ignoring commented line#Reboot to clear logs
  295. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  296. [DEBUG]sending
  297. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  298. mkdir failed for /data/local/tmp, File exists
  299.  
  300.  
  301. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  302.  
  303.  
  304. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  305. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  306. [INFO]Pushing dependencies
  307. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  308. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  309. [INFO]Pushing su binary...
  310. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  311. [DEBUG]Expanded $ZIPFILE: push "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  312. [DEBUG]sending
  313. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  314. 5283 KB/s (91980 bytes in 0.017s)
  315.  
  316. [DEBUG]return from ADB:5283 KB/s (91980 bytes in 0.017s)
  317.  
  318. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  319. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  320. [INFO]Pushing SuperSU app...
  321. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  322. [DEBUG]Expanded $ZIPFILE: push "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  323. [DEBUG]sending
  324. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  325. 4106 KB/s (996704 bytes in 0.237s)
  326.  
  327. [DEBUG]return from ADB:4106 KB/s (996704 bytes in 0.237s)
  328.  
  329. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  330. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  331. [INFO]Pushing Exynos-Abuse exploit
  332. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  333. [DEBUG]Expanded $ZIPFILE: push "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse" /data/local/tmp/
  334. [DEBUG]sending
  335. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  336. cannot stat 'C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse': No such file or directory
  337.  
  338. [DEBUG]return from ADB:cannot stat 'C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse': No such file or directory
  339.  
  340. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  341. [DEBUG]Received ECHO command$ECHO Pushing root script
  342. [INFO]Pushing root script
  343. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  344. [DEBUG]Expanded $ZIPFILE: push "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh" /data/local/tmp/
  345. [DEBUG]sending
  346. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  347. 88 KB/s (361 bytes in 0.004s)
  348.  
  349. [DEBUG]return from ADB:88 KB/s (361 bytes in 0.004s)
  350.  
  351. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  352. [DEBUG]Received ECHO command$ECHO Pushing pit
  353. [INFO]Pushing pit
  354. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  355. [DEBUG]Expanded $ZIPFILE: push "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit" /data/local/tmp/
  356. [DEBUG]sending
  357. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  358. 2666 KB/s (8192 bytes in 0.003s)
  359.  
  360. [DEBUG]return from ADB:2666 KB/s (8192 bytes in 0.003s)
  361.  
  362. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  363. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  364. [INFO]Setting Permissions....
  365. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  366. [DEBUG]sending
  367. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  368. [DEBUG]return from ADB:
  369. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  370. [DEBUG]sending
  371. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  372. [DEBUG]return from ADB:
  373. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  374. [DEBUG]sending
  375. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  376. Unable to chmod /data/local/tmp/exynos-abuse: No such file or directory
  377.  
  378.  
  379. [DEBUG]return from ADB:Unable to chmod /data/local/tmp/exynos-abuse: No such file or directory
  380.  
  381.  
  382. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  383. [DEBUG]sending
  384. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  385. [DEBUG]return from ADB:
  386. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  387. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  388. [INFO]Executing Root Exploit.
  389. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  390. [DEBUG]sending
  391. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  392. /system/bin/sh: /data/local/tmp/exynos-abuse: not found
  393.  
  394.  
  395. [DEBUG]return from ADB:/system/bin/sh: /data/local/tmp/exynos-abuse: not found
  396.  
  397.  
  398. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  399. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  400. [INFO][x]Ready for exploit
  401. [DEBUG]Ignoring commented line#Verify Device is proper
  402. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  403. [DEBUG]checking for results to be false
  404. [DEBUG]requesting shell "cat /proc/version"
  405. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  406. [DEBUG]sending
  407. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  408. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  409.  
  410.  
  411. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  412.  
  413.  
  414. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  415.  
  416.  
  417. [DEBUG]***NEW EVENT ADDED***
  418. [DEBUG]ON EVENT: noroot
  419. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  420. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  421. [DEBUG]sending
  422. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  423. /system/bin/sh: su: not found
  424.  
  425.  
  426. [DEBUG]return from ADB:/system/bin/sh: su: not found
  427.  
  428.  
  429. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  430. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  431. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  432. [INFO][x]Device Verification Checks Complete
  433. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  434. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  435. [INFO][x]Ready for exploit
  436. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  437. [DEBUG]Received ECHO command$ECHO Injecting Code
  438. [INFO]Injecting Code
  439. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  440. [DEBUG]sending
  441. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  442. /system/bin/sh: su: not found
  443.  
  444.  
  445. [DEBUG]return from ADB:/system/bin/sh: su: not found
  446.  
  447.  
  448. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  449. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  450. [INFO][x]Exploit Injection Done.
  451. [DEBUG]SCRIPT COMMAND:reboot download
  452. [DEBUG]sending
  453. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\adb.exe###
  454. [DEBUG]return from ADB:
  455. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  456. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  457. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  458. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  459. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  460. [DEBUG]Received Command: flash --82 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  461. [DEBUG]verifying Heimdall deployment.
  462. [VERBOSE]detected!
  463. [INFO]Executing Heimdall command.
  464. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  465. [DEBUG]###executing real-time command: C:\Users\mmoorm1\AppData\Local\Temp\mmoorm1TEMPCASUAL632E8E31\heimdall.exe###
  466. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  467.  
  468.  
  469.  
  470. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  471.  
  472. http://www.glassechidna.com.au/
  473.  
  474.  
  475.  
  476. This software is provided free of charge. Copying and redistribution is
  477.  
  478. encouraged.
  479.  
  480.  
  481.  
  482. If you appreciate this software and you would like to support future
  483.  
  484. development please consider donating:
  485.  
  486. http://www.glassechidna.com.au/donate/
  487.  
  488.  
  489.  
  490. Initialising connection...
  491.  
  492. Detecting device...
  493.  
  494. Claiming interface...
  495.  
  496. Setting up interface...
  497.  
  498.  
  499.  
  500. Checking if protocol is initialised...
  501.  
  502. Protocol is not initialised.
  503.  
  504.  
  505.  
  506. Initialising protocol...
  507.  
  508. Protocol initialisation successful.
  509.  
  510.  
  511.  
  512. Beginning session...
  513.  
  514.  
  515.  
  516. This device may take up to 2 minutes to respond.
  517.  
  518. Please be patient!
  519.  
  520.  
  521.  
  522. Session begun.
  523.  
  524.  
  525.  
  526. Downloading device's PIT file...
  527.  
  528. PIT file download successful.
  529.  
  530.  
  531.  
  532. ERROR: No partition with identifier "60" exists in the specified PIT.
  533.  
  534. Ending session...
  535.  
  536. Rebooting device...
  537.  
  538. Releasing device interface...
  539.  
  540.  
  541.  
  542. [ERROR]
  543. [Heimdall Error Report] Detected:
  544. Heimdall uncontinuable error; Script halted
  545. [/Heimdall Error Report]
  546.  
  547.  
  548. [DEBUG]HALT RECEIVED
  549. [DEBUG]Finishing remaining commands:$SENDLOG
  550. [DEBUG]Sendlog Command Issued!
  551. No remaining commands
  552. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement