Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [INFO]We are running Windows 7
- Creating Temp Folder in:C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
- Revision:515 build:3,777
- CASUAL Copyright (C) 2013 Adam Outler
- This program comes with ABSOLUTELY NO WARRANTY. This is free software,
- and you are welcome to redistribute it, under certain conditions; run
- 'F:\note%20root\NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar --license'
- for details. http://android-casual.googlecode.com for source.
- [DEBUG]Found Windows Computer
- [DEBUG]Picking Jar File:/F:/note%20root/NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Elevate.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\AdbWinApi.dll
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\AdbWinUsbApi.dll
- [DEBUG]File verified.
- [DEBUG]sleeping for Windows ADB start
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb_usb.ini
- [DEBUG]File verified.
- [DEBUG]###executing: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
- [VERBOSE]* daemon not running. starting it now on port 5037 *
- [DEBUG]adb server is out of date. killing...
- ADB server didn't ACK
- * failed to start daemon *
- error:
- [DEBUG]Device List:
- ADB server didn't ACK
- * failed to start daemon *
- error: cannot connect to daemon
- [DEBUG]* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- unknown
- [DEBUG]OMFGWOOT GUI running!
- [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
- [DEBUG]Searching for scripts
- [DEBUG]Updating Scripts for UI
- [VERBOSE]From Resource: true
- [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
- [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
- [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
- [DEBUG]Exiting comboBoxUpdate()
- [DEBUG]attempted to lock controls but controls are not availble yet
- [DEBUG]Extracting archive....
- [DEBUG]Target Script Is resource
- [VERBOSE]Unzipping Superuser.apk
- [VERBOSE]Unzipping busybox
- [VERBOSE]Unzipping exploit
- [VERBOSE]Unzipping exynos-abuse
- [VERBOSE]Unzipping rootGN.sh
- [VERBOSE]Unzipping swagBoot
- [VERBOSE]Unzipping sch-i605-16gb.pit
- [VERBOSE]Unzipping sboot.bin
- [VERBOSE]Unzipping recoverThis
- [VERBOSE]Unzipping boot.img
- [VERBOSE]Unzipping su
- [VERBOSE]Unzip Complete
- [DEBUG]State Change Detected, The new state is: 1
- [DEBUG]State Connected commanded
- [ERROR]
- [DEBUG]StartButtonActionPerformed() Script Activated
- [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
- [DEBUG]disk location for script resources
- [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
- [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
- [DEBUG]Lines in Script 64
- [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@964f8e
- [DEBUG]CASUAL has initiated a multithreaded execution environment
- [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
- [DEBUG]Reading datastreamjava.io.DataInputStream@964f8e
- [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
- [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
- [DEBUG]Received ECHO command$ECHO Rebooting into download mode
- [INFO]Rebooting into download mode
- [DEBUG]SCRIPT COMMAND:$ADB reboot download
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
- [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
- [DEBUG]Received Command: flash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
- [DEBUG]verifying Heimdall deployment.
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\libusb-1.0.dll
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\msvcp110.dll
- [DEBUG]File verified.
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\msvcr110.dll
- [DEBUG]File verified.
- [VERBOSE]detected!
- [INFO]Executing Heimdall command.
- [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
- Waiting for Downoad Mode device.......Heimdall v1.4 RC2
- Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
- http://www.glassechidna.com.au/
- This software is provided free of charge. Copying and redistribution is
- encouraged.
- If you appreciate this software and you would like to support future
- development please consider donating:
- http://www.glassechidna.com.au/donate/
- Initialising connection...
- Detecting device...
- Claiming interface...
- Setting up interface...
- Checking if protocol is initialised...
- Protocol is not initialised.
- Initialising protocol...
- Protocol initialisation successful.
- Beginning session...
- This device may take up to 2 minutes to respond.
- Please be patient!
- Session begun.
- Uploading PIT
- PIT upload successful
- Uploading BOOTLOADER
- 0%
- 100%
- BOOTLOADER upload successful
- Uploading BOOT
- 0%
- 19%
- 38%
- 57%
- 76%
- 95%
- 100%
- BOOT upload successful
- Ending session...
- Rebooting device...
- Releasing device interface...
- [INFO]
- [Heimdall Success]
- [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
- [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
- [INFO]Your device should be rebooting into Android now.
- [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
- [INFO]Waiting for ADB device connection. When Windows 7 recognizes the device, we will continue. Don't touch anything.
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- error: protocol fault (no status)
- [DEBUG]return from ADB:error: protocol fault (no status)
- [DEBUG]Ignoring commented line#Reboot to clear logs
- [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- * daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- mkdir failed for /data/local/tmp, File exists
- [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- mkdir failed for /data/local/tmp, File exists
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
- [DEBUG]Received ECHO command$ECHO Pushing dependencies
- [INFO]Pushing dependencies
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
- [DEBUG]Received ECHO command$ECHO Pushing su binary...
- [INFO]Pushing su binary...
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- adb server is out of date. killing...
- * daemon started successfully *
- 3241 KB/s (96260 bytes in 0.029s)
- [ERROR]
- [DEBUG]StartButtonActionPerformed() Script Activated
- [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
- [DEBUG]disk location for script resources
- [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
- [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
- [DEBUG]Lines in Script 64
- [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@140727a
- [DEBUG]CASUAL has initiated a multithreaded execution environment
- [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
- [DEBUG]Reading datastreamjava.io.DataInputStream@140727a
- [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
- [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
- [DEBUG]Received ECHO command$ECHO Rebooting into download mode
- [INFO]Rebooting into download mode
- [DEBUG]SCRIPT COMMAND:$ADB reboot download
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
- [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
- [DEBUG]Received Command: flash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
- [DEBUG]verifying Heimdall deployment.
- [VERBOSE]detected!
- [INFO]Executing Heimdall command.
- [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
- Waiting for Downoad Mode device.......Heimdall v1.4 RC2
- Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
- http://www.glassechidna.com.au/
- This software is provided free of charge. Copying and redistribution is
- encouraged.
- If you appreciate this software and you would like to support future
- development please consider donating:
- http://www.glassechidna.com.au/donate/
- Initialising connection...
- Detecting device...
- Claiming interface...
- Setting up interface...
- Checking if protocol is initialised...
- Protocol is not initialised.
- Initialising protocol...
- Protocol initialisation successful.
- Beginning session...
- This device may take up to 2 minutes to respond.
- Please be patient!
- Session begun.
- Uploading PIT
- PIT upload successful
- Uploading BOOTLOADER
- 0%
- 100%
- BOOTLOADER upload successful
- Uploading BOOT
- 0%
- 19%
- 38%
- 57%
- 76%
- 95%
- 100%
- BOOT upload successful
- Ending session...
- Rebooting device...
- Releasing device interface...
- [INFO]
- [Heimdall Success]
- [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
- [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
- [INFO]Your device should be rebooting into Android now.
- [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
- [INFO]Waiting for ADB device connection. When Windows 7 recognizes the device, we will continue. Don't touch anything.
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- error: protocol fault (no status)
- [DEBUG]return from ADB:error: protocol fault (no status)
- [DEBUG]Ignoring commented line#Reboot to clear logs
- [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
- [DEBUG]sending
- [DEBUG]return from ADB:adb server is out of date. killing...
- * daemon started successfully *
- 3241 KB/s (96260 bytes in 0.029s)
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
- [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
- [INFO]Pushing SuperSU app...
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- * daemon not running. starting it now on port 5037 *
- ADB server didn't ACK
- * failed to start daemon *
- error: cannot connect to daemon
- [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
- ADB server didn't ACK
- * failed to start daemon *
- error: cannot connect to daemon
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
- [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
- [INFO]Pushing Exynos-Abuse exploit
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- 1699 KB/s (64373 bytes in 0.037s)
- [DEBUG]return from ADB:1699 KB/s (64373 bytes in 0.037s)
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
- [DEBUG]Received ECHO command$ECHO Pushing root script
- [INFO]Pushing root script
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- 39 KB/s (361 bytes in 0.009s)
- [DEBUG]return from ADB:39 KB/s (361 bytes in 0.009s)
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
- [DEBUG]Received ECHO command$ECHO Pushing pit
- [INFO]Pushing pit
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- 1142 KB/s (8192 bytes in 0.007s)
- [DEBUG]return from ADB:1142 KB/s (8192 bytes in 0.007s)
- [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
- [DEBUG]Received ECHO command$ECHO Setting Permissions....
- [INFO]Setting Permissions....
- [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
- [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
- [INFO]Executing Root Exploit.
- [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [*] s_show->seq_printf format string found at: 0xC086C348
- [*] sys_setresuid found at 0xC00967C4
- [*] patching sys_setresuid at 0xC0096808
- remounting system rw....
- moving su into position
- moving Superuser.apk into position
- [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
- [*] sys_setresuid found at 0xC00967C4
- [*] patching sys_setresuid at 0xC0096808
- remounting system rw....
- moving su into position
- moving Superuser.apk into position
- [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
- [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
- [INFO][x]Ready for exploit
- [DEBUG]Ignoring commented line#Verify Device is proper
- [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
- [DEBUG]checking for results to be false
- [DEBUG]requesting shell "cat /proc/version"
- [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- * daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- mkdir failed for /data/local/tmp, File exists
- [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- mkdir failed for /data/local/tmp, File exists
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
- [DEBUG]Received ECHO command$ECHO Pushing dependencies
- [INFO]Pushing dependencies
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
- [DEBUG]Received ECHO command$ECHO Pushing su binary...
- [INFO]Pushing su binary...
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- 2764 KB/s (96260 bytes in 0.034s)
- [DEBUG]return from ADB:2764 KB/s (96260 bytes in 0.034s)
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
- [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
- [INFO]Pushing SuperSU app...
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- 1600 KB/s (996704 bytes in 0.608s)
- [DEBUG]return from ADB:1600 KB/s (996704 bytes in 0.608s)
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
- [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
- [INFO]Pushing Exynos-Abuse exploit
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- 1964 KB/s (64373 bytes in 0.032s)
- [DEBUG]return from ADB:1964 KB/s (64373 bytes in 0.032s)
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
- [DEBUG]Received ECHO command$ECHO Pushing root script
- [INFO]Pushing root script
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- 117 KB/s (361 bytes in 0.003s)
- [DEBUG]return from ADB:117 KB/s (361 bytes in 0.003s)
- [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
- [DEBUG]Received ECHO command$ECHO Pushing pit
- [INFO]Pushing pit
- [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit exists
- [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit" /data/local/tmp/
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- error: write failure during connection
- [DEBUG]return from ADB:error: write failure during connection
- [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
- [DEBUG]Received ECHO command$ECHO Setting Permissions....
- [INFO]Setting Permissions....
- [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- * daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
- [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
- [DEBUG]got * daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
- [DEBUG]***NEW EVENT ADDED***
- [DEBUG]ON EVENT: noroot
- [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
- [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
- [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
- [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
- [INFO][x]Device Verification Checks Complete
- [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
- [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
- [INFO][x]Ready for exploit
- [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
- [DEBUG]Received ECHO command$ECHO Injecting Code
- [INFO]Injecting Code
- [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- * daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
- [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
- [INFO]Executing Root Exploit.
- [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [*] s_show->seq_printf format string found at: 0xC086C348
- [*] sys_setresuid found at 0xC00967C4
- [*] patching sys_setresuid at 0xC0096808
- remounting system rw....
- moving su into position
- /system/bin/sh: <stdin>[4]: can't create /system/xbin/su: Text file busy
- moving Superuser.apk into position
- [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
- [*] sys_setresuid found at 0xC00967C4
- [*] patching sys_setresuid at 0xC0096808
- remounting system rw....
- moving su into position
- /system/bin/sh: <stdin>[4]: can't create /system/xbin/su: Text file busy
- moving Superuser.apk into position
- [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
- [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
- [INFO][x]Ready for exploit
- [DEBUG]Ignoring commented line#Verify Device is proper
- [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
- [DEBUG]checking for results to be false
- [DEBUG]requesting shell "cat /proc/version"
- [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
- [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
- [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
- [DEBUG]***NEW EVENT ADDED***
- [DEBUG]ON EVENT: noroot
- [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
- [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- [DEBUG]return from ADB:
- [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
- [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
- [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
- [INFO][x]Device Verification Checks Complete
- [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
- [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
- [INFO][x]Ready for exploit
- [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
- [DEBUG]Received ECHO command$ECHO Injecting Code
- [INFO]Injecting Code
- [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- * daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
- [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
- [INFO][x]Exploit Injection Done.
- [DEBUG]SCRIPT COMMAND:reboot download
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- * daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
- [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
- [INFO][x]Exploit Injection Done.
- [DEBUG]SCRIPT COMMAND:reboot download
- [DEBUG]sending
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
- * daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
- [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
- [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
- [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot exists
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis exists
- [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
- [DEBUG]Received Command: flash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
- [DEBUG]verifying Heimdall deployment.
- Waiting for Downoad Mode device.....* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- error: device not found
- [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
- * daemon started successfully *
- error: device not found
- [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
- [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
- [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
- [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot exists
- [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis exists
- [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
- [DEBUG]Received Command: flash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
- [DEBUG]verifying Heimdall deployment.
- [VERBOSE]detected!
- [VERBOSE]detected!
- [INFO]Executing Heimdall command.
- [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
- [INFO]Executing Heimdall command.
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
- [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
- Waiting for Downoad Mode device.........HeimdaHll evi1m.d4a llR C2
- Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
- http://www.glassechidna.com.au/
- This software is provided free of charge. Copying and redistribution is
- encouraged.
- v
- 1
- If .y4o u apprRC2ecia
- th
- is
- Couldo lpike yto surigpporth future
- dtevelopment please consider donating:
- h(ttp://www.glassechidna.com.au/donate/
- c
- ) 2010-2012, Benjamin Dobell, Glass Echidna
- http://www.glassechidna.com.au/
- This software is provided free of charge. Copying and redistribution is
- encouraged.
- If you appreciate this software and you would like to support future
- development please consider donating:
- http://www.glassechidna.com.au/donate/
- IniItialising connection...
- nitialising connection...
- Detecting device...
- Detecting device...
- ERROR: Failed to access device. libusb error: -12
- [ERROR]
- Drivers are Required Launching CADI.
- CASUAL Automated Driver Installer by jrloper.
- Installing Drivers now
- [VERBOSE]Driver Problems suck. Lemme make it easy.
- We're going to install drivers now. Lets do it.
- THIS PROCESS CAN TAKE UP TO 5 MINTUES.
- DURING THIS TIME YOU WILL NOT SEE ANYTHING.
- BE PATIENT!
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\CADI.exe
- ERROR: Failed to access device. libusb error: -12
- [ERROR]
- Drivers are Required Launching CADI.
- CASUAL Automated Driver Installer by jrloper.
- Installing Drivers now
- [VERBOSE]Driver Problems suck. Lemme make it easy.
- We're going to install drivers now. Lets do it.
- THIS PROCESS CAN TAKE UP TO 5 MINTUES.
- DURING THIS TIME YOU WILL NOT SEE ANYTHING.
- BE PATIENT!
- [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\CADI.exe
- [DEBUG]File verified.
- [DEBUG]###executing: cmd.exe###
- [DEBUG]File verified.
- [DEBUG]###executing: cmd.exe###
- [VERBOSE]null
- [INFO]
- [INFO]
- [Heimdall Error Report] Detected:
- 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
- [/Heimdall Error Report]
- [VERBOSE]null
- [INFO]
- [INFO]
- [Heimdall Error Report] Detected:
- 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
- [/Heimdall Error Report]
- [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
- [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
- [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
- Heimdall v1.4 RC2
- H
- 4
- RC2
- yCroight (c) 2010-2012, Benjamin Dobpeyll, Glass Echidnright (c)a
- h0t1t2, Benpjamin Dobell, Glass Echidna
- http://www.glassechidna.co:m.au//
- a
- .
- c
- T
- w
- Thais software is provided free of charge. Copying and redistribution is
- ere is provinded free of charge. Copying and redicouraged.
- stribution is
- encouraged.
- I
- If you appreciate thisf you appreciate this ssofotwaftware and you would like to support future
- dreevelopment please consider donating:
- http://www.gl aansd yous wouled licke to support future
- dheveilodpment pnlease a.cconsider donating:
- hom.atutp/://downateww/.
- g
- lassechidna.com.au/donate/
- Initialising connection...
- Initialising connection...
- Detecting device...
- Detecting device...
- Claiming interface...
- C
- Settliang iminugp iinntteerrffaaccee...
- Setting up interface...
- .
- C.h.ecking if protocol is in
- i
- t
- Checking ialised...
- if protocol is initialised...
- ProtocoPl is notrotocol iinitsi anloitsed.
- init
- i
- Initialising protaloicosle.d...
- Initialising protaloicosle.d...
- r
- Inotiocol inititialalisationi successful.
- Bpergoitnoncionlg. .s.e
- s
- s
- This device may take up to 2 minutes to respond.
- Please be patient!
- ERROR: Unexpected handshake response!ERROR: Unexpected handshake response!ERROR: Failed to send data!Releasing device interface...
- Releasing device interface...
- [INFO]
- [Heimdall Success]
- [ERROR]
- [Heimdall Error Report] Detected:
- Heimdall uncontinuable error; Script halted
- [/Heimdall Error Report]
- [DEBUG]SCRIPT COMMAND:$ECHO waiting for device
- [DEBUG]Received ECHO command$ECHO waiting for device
- [INFO]waiting for device
- [DEBUG]HALT RECEIVED
- [DEBUG]Finishing remaining commands:$SENDLOG
- [INFO]done
- [DEBUG]Sendlog Command Issued!
- No remaining commands
- [INFO]Script Complete
- [DEBUG]State Change Detected, The new state is: 0
- [DEBUG]State Disconnected commanded
- [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment