Guest User

CASUAL r515-imagelost

a guest
Jun 14th, 2013
57
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 21.06 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:515 build:3,777
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\MJHUST\Desktop\NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Picking Jar File:/C:/Users/MJHUST/Desktop/NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar
  10. [DEBUG]Found Windows Computer
  11. [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
  12. [DEBUG]Attempting to write C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Elevate.exe
  13. [DEBUG]File verified.
  14. [DEBUG]Attempting to write C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe
  15. [DEBUG]File verified.
  16. [DEBUG]Attempting to write C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\AdbWinApi.dll
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\AdbWinUsbApi.dll
  19. [DEBUG]File verified.
  20. [DEBUG]sleeping for Windows ADB start
  21. [DEBUG]OMFGWOOT GUI running!
  22. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  23.  
  24. [DEBUG]Searching for scripts
  25. [DEBUG]Updating Scripts for UI
  26. [VERBOSE]From Resource: true
  27. [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
  28. [DEBUG]Attempting to write C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb_usb.ini
  29. [DEBUG]File verified.
  30. [DEBUG]###executing: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  31. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  32.  
  33. [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  34. [DEBUG]Exiting comboBoxUpdate()
  35. [DEBUG]attempted to lock controls but controls are not availble yet
  36. [DEBUG]Extracting archive....
  37. [DEBUG]Target Script Is resource
  38. [VERBOSE]Unzipping Superuser.apk
  39. [VERBOSE]Unzipping busybox
  40. [VERBOSE]Unzipping exploit
  41. [VERBOSE]Unzipping exynos-abuse
  42. [VERBOSE]Unzipping rootGN.sh
  43. [VERBOSE]Unzipping swagBoot
  44. [VERBOSE]Unzipping sch-i605-16gb.pit
  45. [VERBOSE]Unzipping sboot.bin
  46. [VERBOSE]Unzipping recoverThis
  47. [VERBOSE]List of devices attached
  48. [VERBOSE]Unzipping boot.img
  49. [DEBUG]Device List:
  50.  
  51.  
  52.  
  53. [DEBUG]device
  54.  
  55. [VERBOSE]Unzipping su
  56. [VERBOSE]Unzip Complete
  57. [DEBUG]State Change Detected, The new state is: 1
  58. [DEBUG]State Connected commanded
  59. [DEBUG]State Change Detected, The new state is: 0
  60. [DEBUG]State Disconnected commanded
  61. [DEBUG]State Change Detected, The new state is: 1
  62. [DEBUG]State Connected commanded
  63. [ERROR]
  64. [DEBUG]StartButtonActionPerformed() Script Activated
  65. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  66. [DEBUG]disk location for script resources
  67. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  68. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  69. [DEBUG]Lines in Script 64
  70. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@120f0be
  71. [DEBUG]CASUAL has initiated a multithreaded execution environment
  72. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  73. [DEBUG]Reading datastreamjava.io.DataInputStream@120f0be
  74. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  75. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  76. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  77. [INFO]Rebooting into download mode
  78. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  79. [DEBUG]sending
  80. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  81. [DEBUG]return from ADB:
  82. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  83. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  84. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  85. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  86. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  87. [DEBUG]Received Command: flash --pit "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  88. [DEBUG]verifying Heimdall deployment.
  89. [DEBUG]Attempting to write C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\libusb-1.0.dll
  90. [DEBUG]File verified.
  91. [DEBUG]Attempting to write C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\heimdall.exe
  92. [DEBUG]File verified.
  93. [VERBOSE]detected!
  94. [INFO]Executing Heimdall command.
  95. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  96. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\heimdall.exe###
  97. Waiting for Downoad Mode device.....Heimdall v1.4 RC2
  98.  
  99.  
  100.  
  101. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  102.  
  103. http://www.glassechidna.com.au/
  104.  
  105.  
  106.  
  107. This software is provided free of charge. Copying and redistribution is
  108.  
  109. encouraged.
  110.  
  111.  
  112.  
  113. If you appreciate this software and you would like to support future
  114.  
  115. development please consider donating:
  116.  
  117. http://www.glassechidna.com.au/donate/
  118.  
  119.  
  120.  
  121. Initialising connection...
  122.  
  123. Detecting device...
  124.  
  125. Claiming interface...
  126.  
  127. Setting up interface...
  128.  
  129.  
  130.  
  131. Checking if protocol is initialised...
  132.  
  133. Protocol is not initialised.
  134.  
  135.  
  136.  
  137. Initialising protocol...
  138.  
  139. Protocol initialisation successful.
  140.  
  141.  
  142.  
  143. Beginning session...
  144.  
  145.  
  146.  
  147. This device may take up to 2 minutes to respond.
  148.  
  149. Please be patient!
  150.  
  151.  
  152.  
  153. Session begun.
  154.  
  155.  
  156.  
  157. Uploading PIT
  158.  
  159. PIT upload successful
  160.  
  161.  
  162.  
  163. Uploading BOOTLOADER
  164.  
  165. 0%
  166. 
  167. 100%
  168.  
  169. BOOTLOADER upload successful
  170.  
  171.  
  172.  
  173. Uploading BOOT
  174.  
  175. 0%
  176. 
  177. 19%
  178. 
  179. 
  180. 38%
  181. 
  182. 
  183. 57%
  184. 
  185. 
  186. 76%
  187. 
  188. 
  189. 95%
  190. 
  191. 
  192. 100%
  193.  
  194. BOOT upload successful
  195.  
  196.  
  197.  
  198. Ending session...
  199.  
  200. Rebooting device...
  201.  
  202. Releasing device interface...
  203.  
  204.  
  205.  
  206. [INFO]
  207. [Heimdall Success]
  208.  
  209.  
  210. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  211. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  212. [INFO]Your device should be rebooting into Android now.
  213. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  214. [INFO]Waiting for ADB device connection. When Windows 7 recognizes the device, we will continue. Don't touch anything.
  215. [DEBUG]sending
  216. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  217. [DEBUG]return from ADB:
  218. [DEBUG]Ignoring commented line#Reboot to clear logs
  219. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  220. [DEBUG]sending
  221. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  222. mkdir failed for /data/local/tmp, File exists
  223.  
  224.  
  225. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  226.  
  227.  
  228. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  229. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  230. [INFO]Pushing dependencies
  231. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  232. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  233. [INFO]Pushing su binary...
  234. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  235. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  236. [DEBUG]Expanded $ZIPFILE: push "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  237. [DEBUG]sending
  238. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  239. 1999 KB/s (96260 bytes in 0.047s)
  240.  
  241. [DEBUG]return from ADB:1999 KB/s (96260 bytes in 0.047s)
  242.  
  243. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  244. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  245. [INFO]Pushing SuperSU app...
  246. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  247. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  248. [DEBUG]Expanded $ZIPFILE: push "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  249. [DEBUG]sending
  250. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  251. 2300 KB/s (996704 bytes in 0.423s)
  252.  
  253. [DEBUG]return from ADB:2300 KB/s (996704 bytes in 0.423s)
  254.  
  255. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  256. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  257. [INFO]Pushing Exynos-Abuse exploit
  258. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  259. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse exists
  260. [DEBUG]Expanded $ZIPFILE: push "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse" /data/local/tmp/
  261. [DEBUG]sending
  262. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  263. 2095 KB/s (64373 bytes in 0.030s)
  264.  
  265. [DEBUG]return from ADB:2095 KB/s (64373 bytes in 0.030s)
  266.  
  267. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  268. [DEBUG]Received ECHO command$ECHO Pushing root script
  269. [INFO]Pushing root script
  270. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  271. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh exists
  272. [DEBUG]Expanded $ZIPFILE: push "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh" /data/local/tmp/
  273. [DEBUG]sending
  274. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  275. 58 KB/s (361 bytes in 0.006s)
  276.  
  277. [DEBUG]return from ADB:58 KB/s (361 bytes in 0.006s)
  278.  
  279. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  280. [DEBUG]Received ECHO command$ECHO Pushing pit
  281. [INFO]Pushing pit
  282. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  283. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit exists
  284. [DEBUG]Expanded $ZIPFILE: push "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit" /data/local/tmp/
  285. [DEBUG]sending
  286. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  287. 666 KB/s (8192 bytes in 0.012s)
  288.  
  289. [DEBUG]return from ADB:666 KB/s (8192 bytes in 0.012s)
  290.  
  291. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  292. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  293. [INFO]Setting Permissions....
  294. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  295. [DEBUG]sending
  296. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  297. [DEBUG]return from ADB:
  298. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  299. [DEBUG]sending
  300. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  301. [DEBUG]return from ADB:
  302. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  303. [DEBUG]sending
  304. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  305. [DEBUG]return from ADB:
  306. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  307. [DEBUG]sending
  308. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  309. [DEBUG]return from ADB:
  310. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  311. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  312. [INFO]Executing Root Exploit.
  313. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  314. [DEBUG]sending
  315. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  316. [*] s_show->seq_printf format string found at: 0xC086C348
  317.  
  318.  
  319. [*] sys_setresuid found at 0xC00967C4
  320.  
  321.  
  322. [*] patching sys_setresuid at 0xC0096808
  323.  
  324.  
  325. remounting system rw....
  326.  
  327.  
  328. moving su into position
  329.  
  330.  
  331. moving Superuser.apk into position
  332.  
  333.  
  334. [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
  335.  
  336. [*] sys_setresuid found at 0xC00967C4
  337.  
  338. [*] patching sys_setresuid at 0xC0096808
  339.  
  340. remounting system rw....
  341.  
  342. moving su into position
  343.  
  344. moving Superuser.apk into position
  345.  
  346.  
  347. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  348. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  349. [INFO][x]Ready for exploit
  350. [DEBUG]Ignoring commented line#Verify Device is proper
  351. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  352. [DEBUG]checking for results to be false
  353. [DEBUG]requesting shell "cat /proc/version"
  354. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  355. [DEBUG]sending
  356. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  357. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  358.  
  359.  
  360. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  361.  
  362.  
  363. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  364.  
  365.  
  366. [DEBUG]***NEW EVENT ADDED***
  367. [DEBUG]ON EVENT: noroot
  368. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  369. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  370. [DEBUG]sending
  371. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  372. [x]Found rooted device
  373.  
  374.  
  375. [DEBUG]return from ADB:[x]Found rooted device
  376.  
  377.  
  378. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  379. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  380. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  381. [INFO][x]Device Verification Checks Complete
  382. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  383. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  384. [INFO][x]Ready for exploit
  385. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  386. [DEBUG]Received ECHO command$ECHO Injecting Code
  387. [INFO]Injecting Code
  388. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  389. [DEBUG]sending
  390. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  391. 16+0 records in
  392.  
  393.  
  394. 16+0 records out
  395.  
  396.  
  397. 8192 bytes transferred in 0.008 secs (1024000 bytes/sec)
  398.  
  399.  
  400. [DEBUG]return from ADB:16+0 records in
  401.  
  402. 16+0 records out
  403.  
  404. 8192 bytes transferred in 0.008 secs (1024000 bytes/sec)
  405.  
  406.  
  407. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  408. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  409. [INFO][x]Exploit Injection Done.
  410. [DEBUG]SCRIPT COMMAND:reboot download
  411. [DEBUG]sending
  412. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  413. [DEBUG]return from ADB:
  414. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  415. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  416. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  417. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  418. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot exists
  419. [VERBOSE]verified C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis exists
  420. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  421. [DEBUG]Received Command: flash --82 "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  422. [DEBUG]verifying Heimdall deployment.
  423. [VERBOSE]detected!
  424. [INFO]Executing Heimdall command.
  425. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  426. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\heimdall.exe###
  427. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  428.  
  429.  
  430.  
  431. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  432.  
  433. http://www.glassechidna.com.au/
  434.  
  435.  
  436.  
  437. This software is provided free of charge. Copying and redistribution is
  438.  
  439. encouraged.
  440.  
  441.  
  442.  
  443. If you appreciate this software and you would like to support future
  444.  
  445. development please consider donating:
  446.  
  447. http://www.glassechidna.com.au/donate/
  448.  
  449.  
  450.  
  451. Initialising connection...
  452.  
  453. Detecting device...
  454.  
  455. Claiming interface...
  456.  
  457. Setting up interface...
  458.  
  459.  
  460.  
  461. Checking if protocol is initialised...
  462.  
  463. Protocol is not initialised.
  464.  
  465.  
  466.  
  467. Initialising protocol...
  468.  
  469. Protocol initialisation successful.
  470.  
  471.  
  472.  
  473. Beginning session...
  474.  
  475.  
  476.  
  477. This device may take up to 2 minutes to respond.
  478.  
  479. Please be patient!
  480.  
  481.  
  482.  
  483. Session begun.
  484.  
  485.  
  486.  
  487. Downloading device's PIT file...
  488.  
  489. PIT file download successful.
  490.  
  491.  
  492.  
  493. Uploading recovery
  494.  
  495. 0%
  496. 
  497. 14%
  498. 
  499. 
  500. 29%
  501. 
  502. 
  503. 44%
  504. 
  505. 
  506. 59%
  507. 
  508. 
  509. 74%
  510. 
  511. 
  512. 89%
  513. 
  514. 
  515. 100%
  516.  
  517. recovery upload successful
  518.  
  519.  
  520.  
  521. Uploading bootloader
  522.  
  523. 0%
  524. 
  525. 100%
  526.  
  527. bootloader upload successful
  528.  
  529.  
  530.  
  531. Ending session...
  532.  
  533. Rebooting device...
  534.  
  535. Releasing device interface...
  536.  
  537.  
  538.  
  539. [INFO]
  540. [Heimdall Success]
  541.  
  542.  
  543. [DEBUG]SCRIPT COMMAND:$ECHO waiting for device
  544. [DEBUG]Received ECHO command$ECHO waiting for device
  545. [INFO]waiting for device
  546. [DEBUG]Ignoring commented line#END OF SCRIPT
  547. [DEBUG]SCRIPT COMMAND:wait-for-device
  548. [INFO]Waiting for ADB device connection. When Windows 7 recognizes the device, we will continue. Don't touch anything.
  549. [DEBUG]sending
  550. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  551. [DEBUG]return from ADB:
  552. [DEBUG]SCRIPT COMMAND:reboot recovery
  553. [DEBUG]sending
  554. [DEBUG]###executing real-time command: C:\Users\MJHUST\AppData\Local\Temp\MJHUSTTEMPCASUALC8189FCB\adb.exe###
  555. [DEBUG]return from ADB:
  556. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into recovery
  557. [DEBUG]Received ECHO command$ECHO Rebooting into recovery
  558. [INFO]Rebooting into recovery
  559. [DEBUG]SCRIPT COMMAND:$USERNOTIFICATION Congratulations, You should be unlocked!
  560. [INFO]done
  561. [INFO]Script Complete
  562. [DEBUG]State Change Detected, The new state is: 0
  563. [DEBUG]State Disconnected commanded
  564. [DEBUG]State Change Detected, The new state is: 1
  565. [DEBUG]State Connected commanded
  566. [DEBUG]State Change Detected, The new state is: 0
  567. [DEBUG]State Disconnected commanded
  568. [DEBUG]State Change Detected, The new state is: 1
  569. [DEBUG]State Connected commanded
  570. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment