Guest User

CASUAL r465-huwarrior

a guest
May 5th, 2013
86
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 37.08 KB | None | 0 0
  1. [INFO]We are running Windows 7
  2. Creating Temp Folder in:C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\CASUAL Cross-platform Android Scripting and Unified Auxiliary Loader
  3. Revision:465 build:3662
  4. CASUAL Copyright (C) 2013 Adam Outler
  5. This program comes with ABSOLUTELY NO WARRANTY. This is free software,
  6. and you are welcome to redistribute it, under certain conditions; run
  7. 'C:\Users\ryan.alford\Downloads\BackAtchaVerizon-CASUAL-Revision465b(1).jar --license'
  8. for details. http://android-casual.googlecode.com for source.
  9. [DEBUG]Picking Jar File:/C:/Users/ryan.alford/Downloads/BackAtchaVerizon-CASUAL-Revision465b(1).jar
  10. [DEBUG]Found Windows Computer
  11. [DEBUG]Found: WindowsLinux Galaxy Note 2 Jailbreak
  12. [DEBUG]Attempting to write C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\Elevate.exe
  13. [DEBUG]File verified.
  14. [DEBUG]Attempting to write C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe
  15. [DEBUG]File verified.
  16. [DEBUG]Attempting to write C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\AdbWinApi.dll
  17. [DEBUG]File verified.
  18. [DEBUG]Attempting to write C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\AdbWinUsbApi.dll
  19. [DEBUG]File verified.
  20. [DEBUG]sleeping for Windows ADB start
  21. [DEBUG]Attempting to write C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb_usb.ini
  22. [DEBUG]File verified.
  23. [DEBUG]###executing: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  24. [VERBOSE]List of devices attached
  25. [DEBUG]Device List:
  26.  
  27.  
  28.  
  29. [DEBUG]unknown
  30.  
  31. [DEBUG]Control Change requested but Statics.MasterLock is set.
  32. [DEBUG]OMFGWOOT GUI running!
  33. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2.
  34.  
  35. [DEBUG]Searching for scripts
  36. [DEBUG]Updating Scripts for UI
  37. [VERBOSE]From Resource: true
  38. [INFO]--WindowsLinux Galaxy Note 2 Jailbreak--
  39. [INFO]This is a tool which will root, unlock, and install a custom recovery on a Verizon Galaxy Note 2. Put your device into ADB mode. Credit for this exploit goes to Lee Harrison
  40.  
  41. [DEBUG]Created zipResource at /SCRIPTS/WindowsLinux Galaxy Note 2 Jailbreak.zip
  42. [DEBUG]Exiting comboBoxUpdate()
  43. [DEBUG]attempted to lock controls but controls are not availble yet
  44. [DEBUG]Extracting archive....
  45. [DEBUG]Target Script Is resource
  46. [VERBOSE]Unzipping Superuser.apk
  47. [VERBOSE]Unzipping boot.img
  48. [VERBOSE]Unzipping busybox
  49. [VERBOSE]Unzipping dependentinstaller.sh
  50. [VERBOSE]Unzipping exploit
  51. [VERBOSE]Unzipping exynos-abuse
  52. [VERBOSE]Unzipping recoverThis
  53. [VERBOSE]Unzipping rootGN.sh
  54. [VERBOSE]Unzipping su
  55. [VERBOSE]Unzipping swagBoot
  56. [VERBOSE]Unzipping viewmem
  57. [VERBOSE]Unzip Complete
  58. [DEBUG]State Change Detected, The new state is: 1
  59. [DEBUG]State Connected commanded
  60. [DEBUG]Controls Enabled status: true
  61. [ERROR]
  62. [DEBUG]StartButtonActionPerformed() Script Activated
  63. [DEBUG]Script known as WindowsLinux Galaxy Note 2 Jailbreak is running
  64. [DEBUG]Controls Enabled status: false
  65. [DEBUG]disk location for script resources
  66. [DEBUG]Loading internal resource: WindowsLinux Galaxy Note 2 Jailbreak
  67. [DEBUG]Selected resourceWindowsLinux Galaxy Note 2 Jailbreak
  68. [DEBUG]Lines in Script 66
  69. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@8d18c
  70. [DEBUG]CASUAL has initiated a multithreaded execution environment
  71. [DEBUG]***WEB VERSION***
  72. IDString:VERIZON GNOTE
  73. SVNRevision:464
  74. ScriptRevision:2
  75. supportURL:http://forum.xda-developers.com/showthread.php?t=2118348updateMessageUPDATE: Im not supporting old versions
  76. [DEBUG]Reading datastreamjava.io.DataInputStream@8d18c
  77. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the Back Atcha Verizon Odin Bootloader\n package for you.
  78. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  79. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  80. [INFO]Rebooting into download mode
  81. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  82. [DEBUG]sending
  83. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  84. [DEBUG]return from ADB:
  85. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --8 "$ZIPFILEboot.img"
  86. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --8 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  87. [DEBUG]Received Command: flash --8 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  88. [DEBUG]verifying Heimdall deployment.
  89. [DEBUG]Attempting to write C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\libusb-1.0.dll
  90. [DEBUG]File verified.
  91. [DEBUG]Attempting to write C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\heimdall.exe
  92. [DEBUG]File verified.
  93. [DEBUG]Attempting to write C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\msvcp110.dll
  94. [DEBUG]File verified.
  95. [DEBUG]Attempting to write C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\msvcr110.dll
  96. [DEBUG]File verified.
  97. [VERBOSE]detected!
  98. [INFO]Executing Heimdall command.
  99. [VERBOSE]Performing standard Heimdall commandflash --8 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  100. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\heimdall.exe###
  101. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  102.  
  103.  
  104.  
  105. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  106.  
  107. http://www.glassechidna.com.au/
  108.  
  109.  
  110.  
  111. This software is provided free of charge. Copying and redistribution is
  112.  
  113. encouraged.
  114.  
  115.  
  116.  
  117. If you appreciate this software and you would like to support future
  118.  
  119. development please consider donating:
  120.  
  121. http://www.glassechidna.com.au/donate/
  122.  
  123.  
  124.  
  125. Initialising connection...
  126.  
  127. Detecting device...
  128.  
  129. Claiming interface...
  130.  
  131. Setting up interface...
  132.  
  133.  
  134.  
  135. Checking if protocol is initialised...
  136.  
  137. Protocol is not initialised.
  138.  
  139.  
  140.  
  141. Initialising protocol...
  142.  
  143. Protocol initialisation successful.
  144.  
  145.  
  146.  
  147. Beginning session...
  148.  
  149.  
  150.  
  151. This device may take up to 2 minutes to respond.
  152.  
  153. Please be patient!
  154.  
  155.  
  156.  
  157. Session begun.
  158.  
  159.  
  160.  
  161. Downloading device's PIT file...
  162.  
  163. PIT file download successful.
  164.  
  165.  
  166.  
  167. Uploading BOOT
  168.  
  169. 0%
  170. 
  171. 19%
  172. 
  173. 
  174. 38%
  175. 
  176. 
  177. 57%
  178. 
  179. 
  180. 76%
  181. 
  182. 
  183. 95%
  184. 
  185. 
  186. 100%
  187.  
  188. BOOT upload successful
  189.  
  190.  
  191.  
  192. Ending session...
  193.  
  194. Rebooting device...
  195.  
  196. Releasing device interface...
  197.  
  198.  
  199.  
  200. [INFO]
  201. [Heimdall Success]
  202.  
  203.  
  204. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  205. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  206. [INFO]Your device should be rebooting into Android now.
  207. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  208. [INFO]waiting for ADB device connection...
  209. [DEBUG]sending
  210. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  211. [DEBUG]return from ADB:
  212. [DEBUG]Ignoring commented line#Reboot to clear logs
  213. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  214. [DEBUG]sending
  215. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  216. mkdir failed for /data/local/tmp, File exists
  217.  
  218.  
  219. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  220.  
  221.  
  222. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  223. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  224. [INFO]Pushing dependencies
  225. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  226. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  227. [INFO]Pushing su binary...
  228. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  229. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\su" /data/local/tmp/
  230. [DEBUG]sending
  231. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  232. 5757 KB/s (91980 bytes in 0.015s)
  233.  
  234. [DEBUG]return from ADB:5757 KB/s (91980 bytes in 0.015s)
  235.  
  236. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  237. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  238. [INFO]Pushing SuperSU app...
  239. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  240. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\Superuser.apk" /data/local/tmp/
  241. [DEBUG]sending
  242. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  243. 5199 KB/s (996704 bytes in 0.187s)
  244.  
  245. [DEBUG]return from ADB:5199 KB/s (996704 bytes in 0.187s)
  246.  
  247. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  248. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  249. [INFO]Pushing Exynos-Abuse exploit
  250. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  251. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\exynos-abuse" /data/local/tmp/
  252. [DEBUG]sending
  253. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  254. cannot stat 'C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\exynos-abuse': No such file or directory
  255.  
  256. [DEBUG]return from ADB:cannot stat 'C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\exynos-abuse': No such file or directory
  257.  
  258. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  259. [DEBUG]Received ECHO command$ECHO Pushing root script
  260. [INFO]Pushing root script
  261. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  262. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\rootGN.sh" /data/local/tmp/
  263. [DEBUG]sending
  264. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  265. 0 KB/s (361 bytes in 1.000s)
  266.  
  267. [DEBUG]return from ADB:0 KB/s (361 bytes in 1.000s)
  268.  
  269. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Busybox
  270. [DEBUG]Received ECHO command$ECHO Pushing Busybox
  271. [INFO]Pushing Busybox
  272. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEbusybox" /data/local/tmp/
  273. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\busybox" /data/local/tmp/
  274. [DEBUG]sending
  275. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  276. 4031 KB/s (1867568 bytes in 0.452s)
  277.  
  278. [DEBUG]return from ADB:4031 KB/s (1867568 bytes in 0.452s)
  279.  
  280. [DEBUG]SCRIPT COMMAND:$ECHO Pushing viewmem
  281. [DEBUG]Received ECHO command$ECHO Pushing viewmem
  282. [INFO]Pushing viewmem
  283. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEviewmem" /data/local/tmp/
  284. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\viewmem" /data/local/tmp/
  285. [DEBUG]sending
  286. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  287. 339 KB/s (5417 bytes in 0.015s)
  288.  
  289. [DEBUG]return from ADB:339 KB/s (5417 bytes in 0.015s)
  290.  
  291. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  292. [DEBUG]Received ECHO command$ECHO Pushing pit
  293. [INFO]Pushing pit
  294. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  295. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\exploit" /data/local/tmp/
  296. [DEBUG]sending
  297. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  298. 8 KB/s (8192 bytes in 1.000s)
  299.  
  300. [DEBUG]return from ADB:8 KB/s (8192 bytes in 1.000s)
  301.  
  302. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  303. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  304. [INFO]Setting Permissions....
  305. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  306. [DEBUG]sending
  307. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  308. [DEBUG]return from ADB:
  309. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  310. [DEBUG]sending
  311. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  312. [DEBUG]return from ADB:
  313. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  314. [DEBUG]sending
  315. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  316. Unable to chmod /data/local/tmp/exynos-abuse: No such file or directory
  317.  
  318.  
  319. [DEBUG]return from ADB:Unable to chmod /data/local/tmp/exynos-abuse: No such file or directory
  320.  
  321.  
  322. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  323. [DEBUG]sending
  324. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  325. [DEBUG]return from ADB:
  326. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  327. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  328. [INFO]Executing Root Exploit.
  329. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  330. [DEBUG]sending
  331. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  332. /system/bin/sh: /data/local/tmp/exynos-abuse: not found
  333.  
  334.  
  335. [DEBUG]return from ADB:/system/bin/sh: /data/local/tmp/exynos-abuse: not found
  336.  
  337.  
  338. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/viewmem; chmod 777 /data/local/tmp/busybox"
  339. [DEBUG]sending
  340. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  341. [DEBUG]return from ADB:
  342. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  343. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  344. [INFO][x]Ready for exploit
  345. [DEBUG]Ignoring commented line#Verify Device is proper
  346. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  347. [DEBUG]checking for results to be false
  348. [DEBUG]requesting shell "cat /proc/version"
  349. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  350. [DEBUG]sending
  351. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  352. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  353.  
  354.  
  355. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  356.  
  357.  
  358. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  359.  
  360.  
  361. [DEBUG]***NEW EVENT ADDED***
  362. [DEBUG]ON EVENT: noroot
  363. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  364. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  365. [DEBUG]sending
  366. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  367. /system/bin/sh: su: not found
  368.  
  369.  
  370. [DEBUG]return from ADB:/system/bin/sh: su: not found
  371.  
  372.  
  373. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  374. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  375. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  376. [INFO][x]Device Verification Checks Complete
  377. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  378. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  379. [INFO][x]Ready for exploit
  380. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  381. [DEBUG]Received ECHO command$ECHO Injecting Code
  382. [INFO]Injecting Code
  383. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  384. [DEBUG]sending
  385. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  386. /system/bin/sh: su: not found
  387.  
  388.  
  389. [DEBUG]return from ADB:/system/bin/sh: su: not found
  390.  
  391.  
  392. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  393. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  394. [INFO][x]Exploit Injection Done.
  395. [DEBUG]SCRIPT COMMAND:reboot download
  396. [DEBUG]sending
  397. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  398. [DEBUG]return from ADB:
  399. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  400. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  401. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  402. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  403. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  404. [DEBUG]Received Command: flash --82 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  405. [DEBUG]verifying Heimdall deployment.
  406. [VERBOSE]detected!
  407. [INFO]Executing Heimdall command.
  408. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  409. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\heimdall.exe###
  410. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  411.  
  412.  
  413.  
  414. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  415.  
  416. http://www.glassechidna.com.au/
  417.  
  418.  
  419.  
  420. This software is provided free of charge. Copying and redistribution is
  421.  
  422. encouraged.
  423.  
  424.  
  425.  
  426. If you appreciate this software and you would like to support future
  427.  
  428. development please consider donating:
  429.  
  430. http://www.glassechidna.com.au/donate/
  431.  
  432.  
  433.  
  434. Initialising connection...
  435.  
  436. Detecting device...
  437.  
  438. Claiming interface...
  439.  
  440. Setting up interface...
  441.  
  442.  
  443.  
  444. Checking if protocol is initialised...
  445.  
  446. Protocol is not initialised.
  447.  
  448.  
  449.  
  450. Initialising protocol...
  451.  
  452. Protocol initialisation successful.
  453.  
  454.  
  455.  
  456. Beginning session...
  457.  
  458.  
  459.  
  460. This device may take up to 2 minutes to respond.
  461.  
  462. Please be patient!
  463.  
  464.  
  465.  
  466. Session begun.
  467.  
  468.  
  469.  
  470. Downloading device's PIT file...
  471.  
  472. PIT file download successful.
  473.  
  474.  
  475.  
  476. ERROR: No partition with identifier "60" exists in the specified PIT.
  477.  
  478. Ending session...
  479.  
  480. Rebooting device...
  481.  
  482. Releasing device interface...
  483.  
  484.  
  485.  
  486. [ERROR]
  487. [Heimdall Error Report] Detected:
  488. Heimdall uncontinuable error; Script halted
  489. [/Heimdall Error Report]
  490.  
  491.  
  492. [DEBUG]HALT RECEIVED
  493. [DEBUG]Finishing remaining commands:$SENDLOG
  494. [DEBUG]Sendlog Command Issued!
  495. No remaining commands
  496. [DEBUG]Pastebin Login Successful
  497. [DEBUG]http://pastebin.com/rvNMde75
  498. [INFO]done
  499. [DEBUG]Control Change requested but Statics.MasterLock is set.
  500. [DEBUG]State Change Detected, The new state is: 0
  501. [DEBUG]State Disconnected commanded
  502. [DEBUG]Controls Enabled status: false
  503. [DEBUG]State Change Detected, The new state is: 1
  504. [DEBUG]State Connected commanded
  505. [DEBUG]Controls Enabled status: true
  506. [DEBUG]State Change Detected, The new state is: 0
  507. [DEBUG]State Disconnected commanded
  508. [DEBUG]Controls Enabled status: false
  509. [DEBUG]State Change Detected, The new state is: 1
  510. [DEBUG]State Connected commanded
  511. [DEBUG]Controls Enabled status: true
  512. [ERROR]
  513. [DEBUG]StartButtonActionPerformed() Script Activated
  514. [DEBUG]Script known as WindowsLinux Galaxy Note 2 Jailbreak is running
  515. [DEBUG]Controls Enabled status: false
  516. [DEBUG]disk location for script resources
  517. [DEBUG]Loading internal resource: WindowsLinux Galaxy Note 2 Jailbreak
  518. [DEBUG]Selected resourceWindowsLinux Galaxy Note 2 Jailbreak
  519. [DEBUG]Lines in Script 66
  520. [DEBUG]Executing Scripted Datastreamjava.io.DataInputStream@830624
  521. [DEBUG]CASUAL has initiated a multithreaded execution environment
  522. [DEBUG]***WEB VERSION***
  523. IDString:VERIZON GNOTE
  524. SVNRevision:464
  525. ScriptRevision:2
  526. supportURL:http://forum.xda-developers.com/showthread.php?t=2118348updateMessageUPDATE: Im not supporting old versions
  527. [DEBUG]Reading datastreamjava.io.DataInputStream@830624
  528. [DEBUG]SCRIPT COMMAND:$USERCANCELOPTION Are you sure?, This is your only warning.\n You will be Unlocked and Rooted. Your device will\n reboot once and then again into Odin mode. CASUAL\n will then flash the Back Atcha Verizon Odin Bootloader\n package for you.
  529. [DEBUG]SCRIPT COMMAND:$ECHO Rebooting into download mode
  530. [DEBUG]Received ECHO command$ECHO Rebooting into download mode
  531. [INFO]Rebooting into download mode
  532. [DEBUG]SCRIPT COMMAND:$ADB reboot download
  533. [DEBUG]sending
  534. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  535. [DEBUG]return from ADB:
  536. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --8 "$ZIPFILEboot.img"
  537. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --8 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  538. [DEBUG]Received Command: flash --8 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  539. [DEBUG]verifying Heimdall deployment.
  540. [VERBOSE]detected!
  541. [INFO]Executing Heimdall command.
  542. [VERBOSE]Performing standard Heimdall commandflash --8 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\boot.img"
  543. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\heimdall.exe###
  544. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  545.  
  546.  
  547.  
  548. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  549.  
  550. http://www.glassechidna.com.au/
  551.  
  552.  
  553.  
  554. This software is provided free of charge. Copying and redistribution is
  555.  
  556. encouraged.
  557.  
  558.  
  559.  
  560. If you appreciate this software and you would like to support future
  561.  
  562. development please consider donating:
  563.  
  564. http://www.glassechidna.com.au/donate/
  565.  
  566.  
  567.  
  568. Initialising connection...
  569.  
  570. Detecting device...
  571.  
  572. Claiming interface...
  573.  
  574. Setting up interface...
  575.  
  576.  
  577.  
  578. Checking if protocol is initialised...
  579.  
  580. Protocol is not initialised.
  581.  
  582.  
  583.  
  584. Initialising protocol...
  585.  
  586. Protocol initialisation successful.
  587.  
  588.  
  589.  
  590. Beginning session...
  591.  
  592.  
  593.  
  594. This device may take up to 2 minutes to respond.
  595.  
  596. Please be patient!
  597.  
  598.  
  599.  
  600. Session begun.
  601.  
  602.  
  603.  
  604. Downloading device's PIT file...
  605.  
  606. PIT file download successful.
  607.  
  608.  
  609.  
  610. Uploading BOOT
  611.  
  612. 0%
  613. 
  614. 19%
  615. 
  616. 
  617. 38%
  618. 
  619. 
  620. 57%
  621. 
  622. 
  623. 76%
  624. 
  625. 
  626. 95%
  627. 
  628. 
  629. 100%
  630.  
  631. BOOT upload successful
  632.  
  633.  
  634.  
  635. Ending session...
  636.  
  637. Rebooting device...
  638.  
  639. Releasing device interface...
  640.  
  641.  
  642.  
  643. [INFO]
  644. [Heimdall Success]
  645.  
  646.  
  647. [DEBUG]SCRIPT COMMAND:$ECHO Your device should be rebooting into Android now.
  648. [DEBUG]Received ECHO command$ECHO Your device should be rebooting into Android now.
  649. [INFO]Your device should be rebooting into Android now.
  650. [DEBUG]SCRIPT COMMAND:$ADB wait-for-device
  651. [INFO]waiting for ADB device connection...
  652. [DEBUG]sending
  653. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  654. [DEBUG]return from ADB:
  655. [DEBUG]Ignoring commented line#Reboot to clear logs
  656. [DEBUG]SCRIPT COMMAND:shell "mkdir /data/local/tmp"
  657. [DEBUG]sending
  658. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  659. mkdir failed for /data/local/tmp, File exists
  660.  
  661.  
  662. [DEBUG]return from ADB:mkdir failed for /data/local/tmp, File exists
  663.  
  664.  
  665. [DEBUG]SCRIPT COMMAND:$ECHO Pushing dependencies
  666. [DEBUG]Received ECHO command$ECHO Pushing dependencies
  667. [INFO]Pushing dependencies
  668. [DEBUG]SCRIPT COMMAND:$ECHO Pushing su binary...
  669. [DEBUG]Received ECHO command$ECHO Pushing su binary...
  670. [INFO]Pushing su binary...
  671. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEsu" /data/local/tmp/
  672. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\su" /data/local/tmp/
  673. [DEBUG]sending
  674. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  675. 5757 KB/s (91980 bytes in 0.015s)
  676.  
  677. [DEBUG]return from ADB:5757 KB/s (91980 bytes in 0.015s)
  678.  
  679. [DEBUG]SCRIPT COMMAND:$ECHO Pushing SuperSU app...
  680. [DEBUG]Received ECHO command$ECHO Pushing SuperSU app...
  681. [INFO]Pushing SuperSU app...
  682. [DEBUG]SCRIPT COMMAND:push "$ZIPFILESuperuser.apk" /data/local/tmp/
  683. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\Superuser.apk" /data/local/tmp/
  684. [DEBUG]sending
  685. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  686. 4456 KB/s (996704 bytes in 0.218s)
  687.  
  688. [DEBUG]return from ADB:4456 KB/s (996704 bytes in 0.218s)
  689.  
  690. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Exynos-Abuse exploit
  691. [DEBUG]Received ECHO command$ECHO Pushing Exynos-Abuse exploit
  692. [INFO]Pushing Exynos-Abuse exploit
  693. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexynos-abuse" /data/local/tmp/
  694. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\exynos-abuse" /data/local/tmp/
  695. [DEBUG]sending
  696. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  697. cannot stat 'C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\exynos-abuse': No such file or directory
  698.  
  699. [DEBUG]return from ADB:cannot stat 'C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\exynos-abuse': No such file or directory
  700.  
  701. [DEBUG]SCRIPT COMMAND:$ECHO Pushing root script
  702. [DEBUG]Received ECHO command$ECHO Pushing root script
  703. [INFO]Pushing root script
  704. [DEBUG]SCRIPT COMMAND:push "$ZIPFILErootGN.sh" /data/local/tmp/
  705. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\rootGN.sh" /data/local/tmp/
  706. [DEBUG]sending
  707. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  708. 0 KB/s (361 bytes in 1.000s)
  709.  
  710. [DEBUG]return from ADB:0 KB/s (361 bytes in 1.000s)
  711.  
  712. [DEBUG]SCRIPT COMMAND:$ECHO Pushing Busybox
  713. [DEBUG]Received ECHO command$ECHO Pushing Busybox
  714. [INFO]Pushing Busybox
  715. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEbusybox" /data/local/tmp/
  716. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\busybox" /data/local/tmp/
  717. [DEBUG]sending
  718. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  719. 4676 KB/s (1867568 bytes in 0.390s)
  720.  
  721. [DEBUG]return from ADB:4676 KB/s (1867568 bytes in 0.390s)
  722.  
  723. [DEBUG]SCRIPT COMMAND:$ECHO Pushing viewmem
  724. [DEBUG]Received ECHO command$ECHO Pushing viewmem
  725. [INFO]Pushing viewmem
  726. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEviewmem" /data/local/tmp/
  727. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\viewmem" /data/local/tmp/
  728. [DEBUG]sending
  729. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  730. 5 KB/s (5417 bytes in 1.000s)
  731.  
  732. [DEBUG]return from ADB:5 KB/s (5417 bytes in 1.000s)
  733.  
  734. [DEBUG]SCRIPT COMMAND:$ECHO Pushing pit
  735. [DEBUG]Received ECHO command$ECHO Pushing pit
  736. [INFO]Pushing pit
  737. [DEBUG]SCRIPT COMMAND:push "$ZIPFILEexploit" /data/local/tmp/
  738. [DEBUG]Expanded $ZIPFILE: push "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\exploit" /data/local/tmp/
  739. [DEBUG]sending
  740. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  741. 8 KB/s (8192 bytes in 1.000s)
  742.  
  743. [DEBUG]return from ADB:8 KB/s (8192 bytes in 1.000s)
  744.  
  745. [DEBUG]SCRIPT COMMAND:$ECHO Setting Permissions....
  746. [DEBUG]Received ECHO command$ECHO Setting Permissions....
  747. [INFO]Setting Permissions....
  748. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/su"
  749. [DEBUG]sending
  750. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  751. [DEBUG]return from ADB:
  752. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/Superuser.apk"
  753. [DEBUG]sending
  754. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  755. [DEBUG]return from ADB:
  756. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/exynos-abuse"
  757. [DEBUG]sending
  758. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  759. Unable to chmod /data/local/tmp/exynos-abuse: No such file or directory
  760.  
  761.  
  762. [DEBUG]return from ADB:Unable to chmod /data/local/tmp/exynos-abuse: No such file or directory
  763.  
  764.  
  765. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/rootGN.sh"
  766. [DEBUG]sending
  767. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  768. [DEBUG]return from ADB:
  769. [DEBUG]SCRIPT COMMAND:$ECHO Executing Root Exploit.
  770. [DEBUG]Received ECHO command$ECHO Executing Root Exploit.
  771. [INFO]Executing Root Exploit.
  772. [DEBUG]SCRIPT COMMAND:shell "/data/local/tmp/exynos-abuse </data/local/tmp/rootGN.sh"
  773. [DEBUG]sending
  774. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  775. /system/bin/sh: /data/local/tmp/exynos-abuse: not found
  776.  
  777.  
  778. [DEBUG]return from ADB:/system/bin/sh: /data/local/tmp/exynos-abuse: not found
  779.  
  780.  
  781. [DEBUG]SCRIPT COMMAND:shell "chmod 777 /data/local/tmp/viewmem; chmod 777 /data/local/tmp/busybox"
  782. [DEBUG]sending
  783. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  784. [DEBUG]return from ADB:
  785. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  786. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  787. [INFO][x]Ready for exploit
  788. [DEBUG]Ignoring commented line#Verify Device is proper
  789. [DEBUG]SCRIPT COMMAND:$IFNOTCONTAINS 3.0.31-414933 $INCOMMAND shell "cat /proc/version" $DO $USERCANCELOPTION Improper kernel, I have detected an unsupported kernel\n You may continue if you are rooted. Otherwise click stop\n and restart the procedure.
  790. [DEBUG]checking for results to be false
  791. [DEBUG]requesting shell "cat /proc/version"
  792. [DEBUG]SCRIPT COMMAND:shell "cat /proc/version"
  793. [DEBUG]sending
  794. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  795. Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  796.  
  797.  
  798. [DEBUG]return from ADB:Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  799.  
  800.  
  801. [DEBUG]got Linux version 3.0.31-414933 (se.infra@SEP-112) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Sun Oct 28 13:34:23 KST 2012
  802.  
  803.  
  804. [DEBUG]***NEW EVENT ADDED***
  805. [DEBUG]ON EVENT: noroot
  806. [DEBUG]PERFORM ACTION: $HALT $ECHO WHAT THE HELL ARE YOU DOING? I EVEN GAVE YOU A DAMN WARNING.. DEVICE IS NOT ROOTED! ROOT YOUR DEVICE OR INSTALL THE KERNEL! Install any VRALJB kernel and disable any exploit killers --Adam Outler
  807. [DEBUG]SCRIPT COMMAND:shell "su -c 'ls 2>&1 >/dev/null && echo [x]Found rooted device || echo noroot'"
  808. [DEBUG]sending
  809. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  810. /system/bin/sh: su: not found
  811.  
  812.  
  813. [DEBUG]return from ADB:/system/bin/sh: su: not found
  814.  
  815.  
  816. [DEBUG]***$CLEARON RECEIVED. CLEARING ALL LOGGING EVENTS.***
  817. [DEBUG]SCRIPT COMMAND:$ECHO [x]Device Verification Checks Complete
  818. [DEBUG]Received ECHO command$ECHO [x]Device Verification Checks Complete
  819. [INFO][x]Device Verification Checks Complete
  820. [DEBUG]SCRIPT COMMAND:$ECHO [x]Ready for exploit
  821. [DEBUG]Received ECHO command$ECHO [x]Ready for exploit
  822. [INFO][x]Ready for exploit
  823. [DEBUG]SCRIPT COMMAND:$ECHO Injecting Code
  824. [DEBUG]Received ECHO command$ECHO Injecting Code
  825. [INFO]Injecting Code
  826. [DEBUG]SCRIPT COMMAND:shell "su -c 'dd if=/data/local/tmp/exploit of=/dev/block/mmcblk0 bs=512 seek=34 count=16'"
  827. [DEBUG]sending
  828. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  829. /system/bin/sh: su: not found
  830.  
  831.  
  832. [DEBUG]return from ADB:/system/bin/sh: su: not found
  833.  
  834.  
  835. [DEBUG]SCRIPT COMMAND:$ECHO [x]Exploit Injection Done.
  836. [DEBUG]Received ECHO command$ECHO [x]Exploit Injection Done.
  837. [INFO][x]Exploit Injection Done.
  838. [DEBUG]SCRIPT COMMAND:reboot download
  839. [DEBUG]sending
  840. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\adb.exe###
  841. [DEBUG]return from ADB:
  842. [DEBUG]SCRIPT COMMAND:$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  843. [DEBUG]Received ECHO command$ECHO your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  844. [INFO]your device is now rebooting into a totally insecure download mode. Press the Volume Up buton when requested by Download Mode. You will then flash the Suck It Verizon bootloader located here: http://d-h.st/DQG. Upon completion of this step, you will be rebooted into TWRP Recovery. CASUAL will wait for you to complete the insecure flash of the Suck It Verizon Bootloader. Press the Up Key before you flash the bootloader in Odin Mode.
  845. [DEBUG]SCRIPT COMMAND:$HEIMDALL flash --82 "$ZIPFILEswagBoot" --60 "$ZIPFILErecoverThis"
  846. [DEBUG]Expanded $ZIPFILE: $HEIMDALL flash --82 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  847. [DEBUG]Received Command: flash --82 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  848. [DEBUG]verifying Heimdall deployment.
  849. [VERBOSE]detected!
  850. [INFO]Executing Heimdall command.
  851. [VERBOSE]Performing standard Heimdall commandflash --82 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\swagBoot" --60 "C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\WindowsLinux Galaxy Note 2 Jailbreak\recoverThis"
  852. [DEBUG]###executing real-time command: C:\Users\RYAN~1.ALF\AppData\Local\Temp\ryan.alfordTEMPCASUAL4EF98463\heimdall.exe###
  853. Waiting for Downoad Mode device.......Heimdall v1.4 RC2
  854.  
  855.  
  856.  
  857. Copyright (c) 2010-2012, Benjamin Dobell, Glass Echidna
  858.  
  859. http://www.glassechidna.com.au/
  860.  
  861.  
  862.  
  863. This software is provided free of charge. Copying and redistribution is
  864.  
  865. encouraged.
  866.  
  867.  
  868.  
  869. If you appreciate this software and you would like to support future
  870.  
  871. development please consider donating:
  872.  
  873. http://www.glassechidna.com.au/donate/
  874.  
  875.  
  876.  
  877. Initialising connection...
  878.  
  879. Detecting device...
  880.  
  881. Claiming interface...
  882.  
  883. Setting up interface...
  884.  
  885.  
  886.  
  887. Checking if protocol is initialised...
  888.  
  889. Protocol is not initialised.
  890.  
  891.  
  892.  
  893. Initialising protocol...
  894.  
  895. Protocol initialisation successful.
  896.  
  897.  
  898.  
  899. Beginning session...
  900.  
  901.  
  902.  
  903. This device may take up to 2 minutes to respond.
  904.  
  905. Please be patient!
  906.  
  907.  
  908.  
  909. Session begun.
  910.  
  911.  
  912.  
  913. Downloading device's PIT file...
  914.  
  915. PIT file download successful.
  916.  
  917.  
  918.  
  919. ERROR: No partition with identifier "60" exists in the specified PIT.
  920.  
  921. Ending session...
  922.  
  923. Rebooting device...
  924.  
  925. Releasing device interface...
  926.  
  927.  
  928.  
  929. [ERROR]
  930. [Heimdall Error Report] Detected:
  931. Heimdall uncontinuable error; Script halted
  932. [/Heimdall Error Report]
  933.  
  934.  
  935. [DEBUG]HALT RECEIVED
  936. [DEBUG]Finishing remaining commands:$SENDLOG
  937. [DEBUG]Sendlog Command Issued!
  938. No remaining commands
  939. [DEBUG]Pastebin Login Successful
Advertisement
Add Comment
Please, Sign In to add comment