Guest User

CASUAL r515-dapitt84

a guest
Jan 19th, 2014
61
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 40.75 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:515 build:3,777
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'F:\note%20root\NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Found Windows Computer
  10. [DEBUG]Picking Jar File:/F:/note%20root/NoYouVerizon-GalaxyNote2-CASUAL%20R515.jar
  11. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Elevate.exe
  12. [DEBUG]File verified.
  13. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe
  14. [DEBUG]File verified.
  15. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\AdbWinApi.dll
  16. [DEBUG]File verified.
  17. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\AdbWinUsbApi.dll
  18. [DEBUG]File verified.
  19. [DEBUG]sleeping for Windows ADB start
  20. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb_usb.ini
  21. [DEBUG]File verified.
  22. [DEBUG]###executing: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  23. [DEBUG]Found: Galaxy Note 2 Jailbreak-NoYouVerizon
  24. [VERBOSE]* daemon not running. starting it now on port 5037 *
  25. [DEBUG]adb server is out of date. killing...
  26. ADB server didn't ACK
  27. * failed to start daemon *
  28. error:
  29.  
  30. [DEBUG]Device List:
  31. ADB server didn't ACK
  32. * failed to start daemon *
  33. error: cannot connect to daemon
  34.  
  35.  
  36. [DEBUG]* daemon not running. starting it now on port 5037 *
  37. * daemon started successfully *
  38. unknown
  39.  
  40. [DEBUG]OMFGWOOT GUI running!
  41. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  42.  
  43. [DEBUG]Searching for scripts
  44. [DEBUG]Updating Scripts for UI
  45. [VERBOSE]From Resource: true
  46. [INFO]--Galaxy Note 2 Jailbreak-NoYouVerizon--
  47. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  48.  
  49. [DEBUG]Created zipResource at /SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon.zip
  50. [DEBUG]Exiting comboBoxUpdate()
  51. [DEBUG]attempted to lock controls but controls are not availble yet
  52. [DEBUG]Extracting archive....
  53. [DEBUG]Target Script Is resource
  54. [VERBOSE]Unzipping Superuser.apk
  55. [VERBOSE]Unzipping busybox
  56. [VERBOSE]Unzipping exploit
  57. [VERBOSE]Unzipping exynos-abuse
  58. [VERBOSE]Unzipping rootGN.sh
  59. [VERBOSE]Unzipping swagBoot
  60. [VERBOSE]Unzipping sch-i605-16gb.pit
  61. [VERBOSE]Unzipping sboot.bin
  62. [VERBOSE]Unzipping recoverThis
  63. [VERBOSE]Unzipping boot.img
  64. [VERBOSE]Unzipping su
  65. [VERBOSE]Unzip Complete
  66. [DEBUG]State Change Detected, The new state is: 1
  67. [DEBUG]State Connected commanded
  68. [ERROR]
  69. [DEBUG]StartButtonActionPerformed() Script Activated
  70. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  71. [DEBUG]disk location for script resources
  72. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  73. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  74. [DEBUG]Lines in Script 64
  75. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@964f8e
  76. [DEBUG]CASUAL has initiated a multithreaded execution environment
  77. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  78. [DEBUG]Reading datastreamjava.io.DataInputStream@964f8e
  79. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  80. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  81. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  82. [INFO]Rebooting into download mode
  83. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  84. [DEBUG]sending
  85. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  86. [DEBUG]return from ADB:
  87. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  88. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  89. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  90. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  91. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  92. [DEBUG]Received Command: flash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  93. [DEBUG]verifying Heimdall deployment.
  94. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\libusb-1.0.dll
  95. [DEBUG]File verified.
  96. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe
  97. [DEBUG]File verified.
  98. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\msvcp110.dll
  99. [DEBUG]File verified.
  100. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\msvcr110.dll
  101. [DEBUG]File verified.
  102. [VERBOSE]detected!
  103. [INFO]Executing Heimdall command.
  104. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  105. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
  106. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  107.  
  108.  
  109.  
  110. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  111.  
  112. http://www.glassechidna.com.au/
  113.  
  114.  
  115.  
  116. This software is provided free of charge. Copying and redistribution is
  117.  
  118. encouraged.
  119.  
  120.  
  121.  
  122. If you appreciate this software and you would like to support future
  123.  
  124. development please consider donating:
  125.  
  126. http://www.glassechidna.com.au/donate/
  127.  
  128.  
  129.  
  130. Initialising connection...
  131.  
  132. Detecting device...
  133.  
  134. Claiming interface...
  135.  
  136. Setting up interface...
  137.  
  138.  
  139.  
  140. Checking if protocol is initialised...
  141.  
  142. Protocol is not initialised.
  143.  
  144.  
  145.  
  146. Initialising protocol...
  147.  
  148. Protocol initialisation successful.
  149.  
  150.  
  151.  
  152. Beginning session...
  153.  
  154.  
  155.  
  156. This device may take up to 2 minutes to respond.
  157.  
  158. Please be patient!
  159.  
  160.  
  161.  
  162. Session begun.
  163.  
  164.  
  165.  
  166. Uploading PIT
  167.  
  168. PIT upload successful
  169.  
  170.  
  171.  
  172. Uploading BOOTLOADER
  173.  
  174. 0%
  175. 
  176. 100%
  177.  
  178. BOOTLOADER upload successful
  179.  
  180.  
  181.  
  182. Uploading BOOT
  183.  
  184. 0%
  185. 
  186. 19%
  187. 
  188. 
  189. 38%
  190. 
  191. 
  192. 57%
  193. 
  194. 
  195. 76%
  196. 
  197. 
  198. 95%
  199. 
  200. 
  201. 100%
  202.  
  203. BOOT upload successful
  204.  
  205.  
  206.  
  207. Ending session...
  208.  
  209. Rebooting device...
  210.  
  211. Releasing device interface...
  212.  
  213.  
  214.  
  215. [INFO]
  216. [Heimdall Success]
  217.  
  218.  
  219. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  220. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  221. [INFO]Your device should be rebooting into Android now.
  222. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  223. [INFO]Waiting for ADB device connection. When Windows 7 recognizes the device, we will continue. Don't touch anything.
  224. [DEBUG]sending
  225. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  226. error: protocol fault (no status)
  227.  
  228. [DEBUG]return from ADB:error: protocol fault (no status)
  229.  
  230. [DEBUG]Ignoring commented line#Reboot to clear logs
  231. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  232. [DEBUG]sending
  233. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  234. * daemon not running. starting it now on port 5037 *
  235.  
  236. * daemon started successfully *
  237.  
  238. mkdir failed for /data/local/tmp, File exists
  239.  
  240.  
  241. [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
  242. * daemon started successfully *
  243. mkdir failed for /data/local/tmp, File exists
  244.  
  245.  
  246. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  247. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  248. [INFO]Pushing dependencies
  249. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  250. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  251. [INFO]Pushing su binary...
  252. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  253. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  254. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  255. [DEBUG]sending
  256. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  257. adb server is out of date. killing...
  258.  
  259. * daemon started successfully *
  260.  
  261. 3241 KB/s (96260 bytes in 0.029s)
  262.  
  263. [ERROR]
  264. [DEBUG]StartButtonActionPerformed() Script Activated
  265. [DEBUG]Script known as Galaxy Note 2 Jailbreak-NoYouVerizon is running
  266. [DEBUG]disk location for script resources
  267. [DEBUG]Loading internal resource: Galaxy Note 2 Jailbreak-NoYouVerizon
  268. [DEBUG]Selected resourceGalaxy Note 2 Jailbreak-NoYouVerizon
  269. [DEBUG]Lines in Script 64
  270. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@140727a
  271. [DEBUG]CASUAL has initiated a multithreaded execution environment
  272. [DEBUG]/SCRIPTS/Galaxy Note 2 Jailbreak-NoYouVerizon not found in repository.
  273. [DEBUG]Reading datastreamjava.io.DataInputStream@140727a
  274. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the No You Verizon Bootloader\n package for you.
  275. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  276. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  277. [INFO]Rebooting into download mode
  278. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  279. [DEBUG]sending
  280. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  281. [DEBUG]return from ADB:
  282. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --pit "$ZIPFILEsch-i605-16gb.pit" --repartition --BOOTLOADER "$ZIPFILEsboot.bin" --8 "$ZIPFILEboot.img"
  283. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit exists
  284. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin exists
  285. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img exists
  286. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  287. [DEBUG]Received Command: flash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  288. [DEBUG]verifying Heimdall deployment.
  289. [VERBOSE]detected!
  290. [INFO]Executing Heimdall command.
  291. [VERBOSE]Performing standard Heimdall commandflash --pit "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sch-i605-16gb.pit" --repartition --BOOTLOADER "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\sboot.bin" --8 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\boot.img"
  292. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
  293. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  294.  
  295.  
  296.  
  297. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  298.  
  299. http://www.glassechidna.com.au/
  300.  
  301.  
  302.  
  303. This software is provided free of charge. Copying and redistribution is
  304.  
  305. encouraged.
  306.  
  307.  
  308.  
  309. If you appreciate this software and you would like to support future
  310.  
  311. development please consider donating:
  312.  
  313. http://www.glassechidna.com.au/donate/
  314.  
  315.  
  316.  
  317. Initialising connection...
  318.  
  319. Detecting device...
  320.  
  321. Claiming interface...
  322.  
  323. Setting up interface...
  324.  
  325.  
  326.  
  327. Checking if protocol is initialised...
  328.  
  329. Protocol is not initialised.
  330.  
  331.  
  332.  
  333. Initialising protocol...
  334.  
  335. Protocol initialisation successful.
  336.  
  337.  
  338.  
  339. Beginning session...
  340.  
  341.  
  342.  
  343. This device may take up to 2 minutes to respond.
  344.  
  345. Please be patient!
  346.  
  347.  
  348.  
  349. Session begun.
  350.  
  351.  
  352.  
  353. Uploading PIT
  354.  
  355. PIT upload successful
  356.  
  357.  
  358.  
  359. Uploading BOOTLOADER
  360.  
  361. 0%
  362. 
  363. 100%
  364.  
  365. BOOTLOADER upload successful
  366.  
  367.  
  368.  
  369. Uploading BOOT
  370.  
  371. 0%
  372. 
  373. 19%
  374. 
  375. 
  376. 38%
  377. 
  378. 
  379. 57%
  380. 
  381. 
  382. 76%
  383. 
  384. 
  385. 95%
  386. 
  387. 
  388. 100%
  389.  
  390. BOOT upload successful
  391.  
  392.  
  393.  
  394. Ending session...
  395.  
  396. Rebooting device...
  397.  
  398. Releasing device interface...
  399.  
  400.  
  401.  
  402. [INFO]
  403. [Heimdall Success]
  404.  
  405.  
  406. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  407. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  408. [INFO]Your device should be rebooting into Android now.
  409. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  410. [INFO]Waiting for ADB device connection. When Windows 7 recognizes the device, we will continue. Don't touch anything.
  411. [DEBUG]sending
  412. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  413. error: protocol fault (no status)
  414.  
  415. [DEBUG]return from ADB:error: protocol fault (no status)
  416.  
  417. [DEBUG]Ignoring commented line#Reboot to clear logs
  418. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  419. [DEBUG]sending
  420. [DEBUG]return from ADB:adb server is out of date. killing...
  421. * daemon started successfully *
  422. 3241 KB/s (96260 bytes in 0.029s)
  423.  
  424. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  425. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  426. [INFO]Pushing SuperSU app...
  427. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  428. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  429. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  430. [DEBUG]sending
  431. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  432. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  433. * daemon not running. starting it now on port 5037 *
  434.  
  435. ADB server didn't ACK
  436.  
  437. * failed to start daemon *
  438.  
  439. error: cannot connect to daemon
  440.  
  441. [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
  442. ADB server didn't ACK
  443. * failed to start daemon *
  444. error: cannot connect to daemon
  445.  
  446. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  447. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  448. [INFO]Pushing Exynos-Abuse exploit
  449. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  450. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse exists
  451. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse" /data/local/tmp/
  452. [DEBUG]sending
  453. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  454. 1699 KB/s (64373 bytes in 0.037s)
  455.  
  456. [DEBUG]return from ADB:1699 KB/s (64373 bytes in 0.037s)
  457.  
  458. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  459. [DEBUG]Received ECHO command$ECHO Pushing root script
  460. [INFO]Pushing root script
  461. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  462. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh exists
  463. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh" /data/local/tmp/
  464. [DEBUG]sending
  465. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  466. 39 KB/s (361 bytes in 0.009s)
  467.  
  468. [DEBUG]return from ADB:39 KB/s (361 bytes in 0.009s)
  469.  
  470. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  471. [DEBUG]Received ECHO command$ECHO Pushing pit
  472. [INFO]Pushing pit
  473. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  474. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit exists
  475. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit" /data/local/tmp/
  476. [DEBUG]sending
  477. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  478. 1142 KB/s (8192 bytes in 0.007s)
  479.  
  480. [DEBUG]return from ADB:1142 KB/s (8192 bytes in 0.007s)
  481.  
  482. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  483. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  484. [INFO]Setting Permissions....
  485. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  486. [DEBUG]sending
  487. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  488. [DEBUG]return from ADB:
  489. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  490. [DEBUG]sending
  491. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  492. [DEBUG]return from ADB:
  493. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  494. [DEBUG]sending
  495. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  496. [DEBUG]return from ADB:
  497. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  498. [DEBUG]sending
  499. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  500. [DEBUG]return from ADB:
  501. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  502. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  503. [INFO]Executing Root Exploit.
  504. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  505. [DEBUG]sending
  506. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  507. [*] s_show->seq_printf format string found at: 0xC086C348
  508.  
  509.  
  510. [*] sys_setresuid found at 0xC00967C4
  511.  
  512.  
  513. [*] patching sys_setresuid at 0xC0096808
  514.  
  515.  
  516. remounting system rw....
  517.  
  518.  
  519. moving su into position
  520.  
  521.  
  522. moving Superuser.apk into position
  523.  
  524.  
  525. [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
  526.  
  527. [*] sys_setresuid found at 0xC00967C4
  528.  
  529. [*] patching sys_setresuid at 0xC0096808
  530.  
  531. remounting system rw....
  532.  
  533. moving su into position
  534.  
  535. moving Superuser.apk into position
  536.  
  537.  
  538. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  539. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  540. [INFO][x]Ready for exploit
  541. [DEBUG]Ignoring commented line#Verify Device is proper
  542. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  543. [DEBUG]checking for results to be false
  544. [DEBUG]requesting shell "cat /proc/version"
  545. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  546. [DEBUG]sending
  547. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  548. * daemon not running. starting it now on port 5037 *
  549.  
  550. * daemon started successfully *
  551.  
  552. mkdir failed for /data/local/tmp, File exists
  553.  
  554.  
  555. [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
  556. * daemon started successfully *
  557. mkdir failed for /data/local/tmp, File exists
  558.  
  559.  
  560. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  561. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  562. [INFO]Pushing dependencies
  563. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  564. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  565. [INFO]Pushing su binary...
  566. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  567. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\su exists
  568. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\su" /data/local/tmp/
  569. [DEBUG]sending
  570. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  571. 2764 KB/s (96260 bytes in 0.034s)
  572.  
  573. [DEBUG]return from ADB:2764 KB/s (96260 bytes in 0.034s)
  574.  
  575. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  576. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  577. [INFO]Pushing SuperSU app...
  578. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  579. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk exists
  580. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\Superuser.apk" /data/local/tmp/
  581. [DEBUG]sending
  582. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  583. 1600 KB/s (996704 bytes in 0.608s)
  584.  
  585. [DEBUG]return from ADB:1600 KB/s (996704 bytes in 0.608s)
  586.  
  587. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  588. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  589. [INFO]Pushing Exynos-Abuse exploit
  590. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  591. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse exists
  592. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exynos-abuse" /data/local/tmp/
  593. [DEBUG]sending
  594. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  595. 1964 KB/s (64373 bytes in 0.032s)
  596.  
  597. [DEBUG]return from ADB:1964 KB/s (64373 bytes in 0.032s)
  598.  
  599. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  600. [DEBUG]Received ECHO command$ECHO Pushing root script
  601. [INFO]Pushing root script
  602. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  603. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh exists
  604. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\rootGN.sh" /data/local/tmp/
  605. [DEBUG]sending
  606. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  607. 117 KB/s (361 bytes in 0.003s)
  608.  
  609. [DEBUG]return from ADB:117 KB/s (361 bytes in 0.003s)
  610.  
  611. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  612. [DEBUG]Received ECHO command$ECHO Pushing pit
  613. [INFO]Pushing pit
  614. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  615. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit exists
  616. [DEBUG]Expanded $ZIPFILE: push "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\exploit" /data/local/tmp/
  617. [DEBUG]sending
  618. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  619. error: write failure during connection
  620.  
  621. [DEBUG]return from ADB:error: write failure during connection
  622.  
  623. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  624. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  625. [INFO]Setting Permissions....
  626. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  627. [DEBUG]sending
  628. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  629. * daemon not running. starting it now on port 5037 *
  630.  
  631. * daemon started successfully *
  632.  
  633. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  634.  
  635.  
  636. [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
  637. * daemon started successfully *
  638. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  639.  
  640.  
  641. [DEBUG]got * daemon not running. starting it now on port 5037 *
  642. * daemon started successfully *
  643. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  644.  
  645.  
  646. [DEBUG]***NEW EVENT ADDED***
  647. [DEBUG]ON EVENT: noroot
  648. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  649. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  650. [DEBUG]sending
  651. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  652. [DEBUG]return from ADB:
  653. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  654. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  655. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  656. [INFO][x]Device Verification Checks Complete
  657. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  658. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  659. [INFO][x]Ready for exploit
  660. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  661. [DEBUG]Received ECHO command$ECHO Injecting Code
  662. [INFO]Injecting Code
  663. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  664. [DEBUG]sending
  665. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  666. * daemon not running. starting it now on port 5037 *
  667.  
  668. * daemon started successfully *
  669.  
  670. [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
  671. * daemon started successfully *
  672.  
  673. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  674. [DEBUG]sending
  675. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  676. [DEBUG]return from ADB:
  677. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  678. [DEBUG]sending
  679. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  680. [DEBUG]return from ADB:
  681. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  682. [DEBUG]sending
  683. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  684. [DEBUG]return from ADB:
  685. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  686. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  687. [INFO]Executing Root Exploit.
  688. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  689. [DEBUG]sending
  690. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  691. [*] s_show->seq_printf format string found at: 0xC086C348
  692.  
  693.  
  694. [*] sys_setresuid found at 0xC00967C4
  695.  
  696.  
  697. [*] patching sys_setresuid at 0xC0096808
  698.  
  699.  
  700. remounting system rw....
  701.  
  702.  
  703. moving su into position
  704.  
  705.  
  706. /system/bin/sh: <stdin>[4]: can't create /system/xbin/su: Text file busy
  707.  
  708.  
  709. moving Superuser.apk into position
  710.  
  711.  
  712. [DEBUG]return from ADB:[*] s_show->seq_printf format string found at: 0xC086C348
  713.  
  714. [*] sys_setresuid found at 0xC00967C4
  715.  
  716. [*] patching sys_setresuid at 0xC0096808
  717.  
  718. remounting system rw....
  719.  
  720. moving su into position
  721.  
  722. /system/bin/sh: <stdin>[4]: can't create /system/xbin/su: Text file busy
  723.  
  724. moving Superuser.apk into position
  725.  
  726.  
  727. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  728. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  729. [INFO][x]Ready for exploit
  730. [DEBUG]Ignoring commented line#Verify Device is proper
  731. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  732. [DEBUG]checking for results to be false
  733. [DEBUG]requesting shell "cat /proc/version"
  734. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  735. [DEBUG]sending
  736. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  737. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  738.  
  739.  
  740. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  741.  
  742.  
  743. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  744.  
  745.  
  746. [DEBUG]***NEW EVENT ADDED***
  747. [DEBUG]ON EVENT: noroot
  748. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  749. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  750. [DEBUG]sending
  751. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  752. [DEBUG]return from ADB:
  753. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  754. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  755. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  756. [INFO][x]Device Verification Checks Complete
  757. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  758. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  759. [INFO][x]Ready for exploit
  760. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  761. [DEBUG]Received ECHO command$ECHO Injecting Code
  762. [INFO]Injecting Code
  763. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  764. [DEBUG]sending
  765. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  766. * daemon not running. starting it now on port 5037 *
  767.  
  768. * daemon started successfully *
  769.  
  770. [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
  771. * daemon started successfully *
  772.  
  773. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  774. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  775. [INFO][x]Exploit Injection Done.
  776. [DEBUG]SCRIPT COMMAND:reboot download
  777. [DEBUG]sending
  778. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  779. * daemon not running. starting it now on port 5037 *
  780.  
  781. * daemon started successfully *
  782.  
  783. [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
  784. * daemon started successfully *
  785.  
  786. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  787. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  788. [INFO][x]Exploit Injection Done.
  789. [DEBUG]SCRIPT COMMAND:reboot download
  790. [DEBUG]sending
  791. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\adb.exe###
  792. * daemon not running. starting it now on port 5037 *
  793.  
  794. * daemon started successfully *
  795.  
  796. [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
  797. * daemon started successfully *
  798.  
  799. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  800. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  801. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  802. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  803. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot exists
  804. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis exists
  805. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  806. [DEBUG]Received Command: flash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  807. [DEBUG]verifying Heimdall deployment.
  808. Waiting for Downoad Mode device.....* daemon not running. starting it now on port 5037 *
  809.  
  810. * daemon started successfully *
  811.  
  812. error: device not found
  813.  
  814. [DEBUG]return from ADB:* daemon not running. starting it now on port 5037 *
  815. * daemon started successfully *
  816. error: device not found
  817.  
  818. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  819. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  820. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the No You Verizon Bootloader.
  821. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  822. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot exists
  823. [VERBOSE]verified C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis exists
  824. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  825. [DEBUG]Received Command: flash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  826. [DEBUG]verifying Heimdall deployment.
  827. [VERBOSE]detected!
  828. [VERBOSE]detected!
  829. [INFO]Executing Heimdall command.
  830. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  831. [INFO]Executing Heimdall command.
  832. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
  833. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  834. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
  835. Waiting for Downoad Mode device.........HeimdaHll evi1m.d4a llR C2
  836.  
  837.  
  838.  
  839. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  840.  
  841. http://www.glassechidna.com.au/
  842.  
  843.  
  844.  
  845. This software is provided free of charge. Copying and redistribution is
  846.  
  847. encouraged.
  848.  
  849.  
  850. v
  851. 1
  852. If .y4o u apprRC2ecia
  853.  
  854.  
  855. th
  856. is
  857. Couldo lpike yto surigpporth future
  858.  
  859. dtevelopment please consider donating:
  860.  
  861. h(ttp://www.glassechidna.com.au/donate/
  862.  
  863.  
  864. c
  865.  
  866. ) 2010-2012, Benjamin Dobell, Glass Echidna
  867.  
  868. http://www.glassechidna.com.au/
  869.  
  870.  
  871.  
  872. This software is provided free of charge. Copying and redistribution is
  873.  
  874. encouraged.
  875.  
  876.  
  877.  
  878. If you appreciate this software and you would like to support future
  879.  
  880. development please consider donating:
  881.  
  882. http://www.glassechidna.com.au/donate/
  883.  
  884.  
  885.  
  886. IniItialising connection...
  887.  
  888. nitialising connection...
  889.  
  890. Detecting device...
  891.  
  892. Detecting device...
  893.  
  894. ERROR: Failed to access device. libusb error: -12
  895.  
  896. [ERROR]
  897. Drivers are Required Launching CADI.
  898. CASUAL Automated Driver Installer by jrloper.
  899. Installing Drivers now
  900. [VERBOSE]Driver Problems suck. Lemme make it easy.
  901. We're going to install drivers now. Lets do it.
  902. THIS PROCESS CAN TAKE UP TO 5 MINTUES.
  903. DURING THIS TIME YOU WILL NOT SEE ANYTHING.
  904. BE PATIENT!
  905. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\CADI.exe
  906. ERROR: Failed to access device. libusb error: -12
  907.  
  908. [ERROR]
  909. Drivers are Required Launching CADI.
  910. CASUAL Automated Driver Installer by jrloper.
  911. Installing Drivers now
  912. [VERBOSE]Driver Problems suck. Lemme make it easy.
  913. We're going to install drivers now. Lets do it.
  914. THIS PROCESS CAN TAKE UP TO 5 MINTUES.
  915. DURING THIS TIME YOU WILL NOT SEE ANYTHING.
  916. BE PATIENT!
  917. [DEBUG]Attempting to write C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\CADI.exe
  918. [DEBUG]File verified.
  919. [DEBUG]###executing: cmd.exe###
  920. [DEBUG]File verified.
  921. [DEBUG]###executing: cmd.exe###
  922. [VERBOSE]null
  923. [INFO]
  924.  
  925. [INFO]
  926. [Heimdall Error Report] Detected:
  927. 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
  928. [/Heimdall Error Report]
  929.  
  930.  
  931. [VERBOSE]null
  932. [INFO]
  933.  
  934. [INFO]
  935. [Heimdall Error Report] Detected:
  936. 'LIBUSB_ERROR_NOT_SUPPORTED'; Attempting to continue
  937. [/Heimdall Error Report]
  938.  
  939.  
  940. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  941. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\swagBoot" --60 "C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\Galaxy Note 2 Jailbreak-NoYouVerizon\recoverThis"
  942. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
  943. [DEBUG]###executing real-time command: C:\Users\Zack\AppData\Local\Temp\ZackTEMPCASUALCE435FCD\heimdall.exe###
  944. Heimdall v1.4 RC2
  945. H
  946.  
  947. 4
  948. RC2
  949.  
  950.  
  951.  
  952.  
  953.  
  954. yCroight (c) 2010-2012, Benjamin Dobpeyll, Glass Echidnright (c)a
  955.  
  956. h0t1t2, Benpjamin Dobell, Glass Echidna
  957.  
  958. http://www.glassechidna.co:m.au//
  959.  
  960. a
  961. .
  962. c
  963. T
  964.  
  965. w
  966. Thais software is provided free of charge. Copying and redistribution is
  967.  
  968. ere is provinded free of charge. Copying and redicouraged.
  969.  
  970.  
  971. stribution is
  972.  
  973. encouraged.
  974.  
  975.  
  976.  
  977.  
  978. I
  979. If you appreciate thisf you appreciate this ssofotwaftware and you would like to support future
  980.  
  981. dreevelopment please consider donating:
  982.  
  983. http://www.gl aansd yous wouled licke to support future
  984.  
  985. dheveilodpment pnlease a.cconsider donating:
  986.  
  987. hom.atutp/://downateww/.
  988.  
  989.  
  990. g
  991. lassechidna.com.au/donate/
  992.  
  993.  
  994.  
  995. Initialising connection...
  996.  
  997. Initialising connection...
  998.  
  999. Detecting device...
  1000.  
  1001. Detecting device...
  1002.  
  1003. Claiming interface...
  1004. C
  1005. Settliang iminugp iinntteerrffaaccee...
  1006.  
  1007. Setting up interface...
  1008.  
  1009.  
  1010. .
  1011. C.h.ecking if protocol is in
  1012. i
  1013. t
  1014.  
  1015.  
  1016. Checking ialised...
  1017.  
  1018. if protocol is initialised...
  1019.  
  1020. ProtocoPl is notrotocol iinitsi anloitsed.
  1021.  
  1022.  
  1023. init
  1024. i
  1025. Initialising protaloicosle.d...
  1026.  
  1027.  
  1028.  
  1029. Initialising protaloicosle.d...
  1030.  
  1031.  
  1032.  
  1033.  
  1034. r
  1035.  
  1036. Inotiocol inititialalisationi successful.
  1037.  
  1038.  
  1039.  
  1040. Bpergoitnoncionlg. .s.e
  1041. s
  1042. s
  1043.  
  1044.  
  1045.  
  1046. This device may take up to 2 minutes to respond.
  1047.  
  1048. Please be patient!
  1049.  
  1050.  
  1051.  
  1052. ERROR: Unexpected handshake response!ERROR: Unexpected handshake response!ERROR: Failed to send data!Releasing device interface...
  1053.  
  1054.  
  1055.  
  1056. Releasing device interface...
  1057.  
  1058.  
  1059.  
  1060. [INFO]
  1061. [Heimdall Success]
  1062.  
  1063.  
  1064. [ERROR]
  1065. [Heimdall Error Report] Detected:
  1066. Heimdall uncontinuable error; Script halted
  1067. [/Heimdall Error Report]
  1068.  
  1069.  
  1070. [DEBUG]SCRIPT COMMAND:$ECHO waiting for device
  1071. [DEBUG]Received ECHO command$ECHO waiting for device
  1072. [INFO]waiting for device
  1073. [DEBUG]HALT RECEIVED
  1074. [DEBUG]Finishing remaining commands:$SENDLOG
  1075. [INFO]done
  1076. [DEBUG]Sendlog Command Issued!
  1077. No remaining commands
  1078. [INFO]Script Complete
  1079. [DEBUG]State Change Detected, The new state is: 0
  1080. [DEBUG]State Disconnected commanded
  1081. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment