Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Version: Universal Androot - v1.6.2 beta
- Detected OS version:5
- Go for root !
- User selected: Eclair
- Trying to get mount point:/system/bin
- Preparing Exploit ... :1
- Preparing busybox binary ... :1
- Preparing Su binary ... :1
- Preparing Superuser apk ... :1, resid:2130968582
- Preparing root toolkit script ... :1
- Trying to get mount point:/data
- /dev/block/mtdblock7 /data yaffs2 rw,nosuid,nodev 0 0
- Trying to get mount point:/system
- /dev/block/mtdblock6 /system yaffs2 ro 0 0
- insmod ./tattoo_hack_gf922713.ko
- insmod ./tattoo_hack_g6561203.ko
- mount -o remount,rw /dev/block/mtdblock6 /system
- cat su > /system/bin/su
- chmod 04755 /system/bin/su
- mount -o remount,ro /dev/block/mtdblock6 /system
- insmod ./tattoo_hack_gf922713.ko
- insmod ./tattoo_hack_g6561203.ko
- mount -o remount,rw /dev/block/mtdblock6 /system
- rm /system/bin/su
- mount -o remount,rw,nosuid,nodev -t yaffs2 /dev/block/mtdblock7 /data
- mount -o remount,ro /dev/block/mtdblock6 /system
- Preparing to execute exploit, do chmod
- Executing exploit..
- cmd: /data/data/com.corner23.android.universalandroot/files/getroot /dev/block/mtdblock7 yaffs2
- [*] Android local root exploid (C) The Android Exploid Crew
- [*] Modified by shakalaca for various devices
- [+] Using basedir=/sqlite_stmt_journals, path=/data/data/com.corner23.android.universalandroot/files/getroot
- [+] opening NETLINK_KOBJECT_UEVENT socket
- [+] sending add message ...
- [*] Try to invoke hotplug now, clicking at the wireless
- [*] settings, plugin USB key etc.
- [*] You succeeded if you find /system/bin/rootshell.
- [*] GUI might hang/restart meanwhile so be patient.
- Wifi disabled ...
- After wifi, do copy files
- Root shell is missing ..
- ls -l /system/etc
- drwxr-xr-x root root 2010-11-03 02:09 dhcpcd
- -rw-r--r-- root root 192 2010-11-03 02:09 pvplayer_mot.cfg
- drwxr-xr-x root root 2010-11-03 02:09 ftm
- -rw-r--r-- root root 326 2010-11-03 02:16 vold.conf
- -rw-r--r-- root root 2046 2010-11-03 02:09 bookmarks.xml
- -rw-r--r-- root root 58483 2010-11-03 02:09 NOTICE.html.gz
- -r--r----- bluetooth bluetooth 935 2010-11-03 02:09 dbus.conf
- -rw-r--r-- root root 12964 2010-11-03 02:09 mot_ise_imager_cfg.bin
- -rw-r--r-- root root 507 2010-11-03 02:09 vomeplay.cfg
- -rw-r--r-- root root 77704 2010-11-03 02:09 firmware.enc
- drwxr-xr-x root root 2010-11-03 02:09 stereo_test_data
- -rw-r--r-- root root 1106 2010-11-03 02:09 config.cfg
- drwxr-xr-x root root 2010-11-03 02:09 permissions
- -rw-r--r-- root root 8180 2010-11-03 02:09 event-log-tags
- -rw-r--r-- root root 32768 2010-11-03 02:09 voVidDec.dat
- -rw-r--r-- root root 25 2010-11-03 02:09 hosts
- -r-xr-x--- root shell 1176 2010-11-03 02:09 init.goldfish.sh
- -rw-r--r-- root root 83048 2010-11-03 02:09 defaults.xml
- -rw-r--r-- root root 352 2010-11-03 02:09 mototouch.cookie
- drwxr-xr-x root root 2010-11-03 02:09 security
- drwxr-xr-x root root 2010-11-03 02:09 bluez
- drwxr-xr-x root root 2010-11-03 02:09 ppp
- -rw-r--r-- root root 1471 2010-11-03 02:09 apns-conf.xml
- -rw-r--r-- root root 473 2010-11-03 02:09 pvplayer.cfg
- -rw-r--r-- root root 961 2010-11-03 02:09 vomeComp.cfg
- -rw-r--r-- root root 587 2010-11-03 02:09 vommcodec.cfg
- -rw-r--r-- root root 16927 2010-11-03 02:16 manifest
- -rw-r--r-- root root 983 2010-11-03 02:16 logging_ifta_config_default
- -rw-r--r-- root root 497 2010-11-03 02:09 vomeCore.cfg
- ls -l /sqlite_stmt_journals
- lrwxrwxrwx app_43 app_43 2011-06-24 20:39 data -> /proc/sys/kernel/hotplug
- -rw-r--r-- app_43 app_43 6 2011-06-24 20:39 fs_type
- -rw-r--r-- app_43 app_43 20 2011-06-24 20:39 mount
- -rw-r--r-- app_43 app_43 62 2011-06-24 20:39 hotplug
- -rw-rw-rw- app_43 app_43 0 2011-06-24 20:39 loading
- ls -l /data/local/tmp
- opendir failed, Permission denied
- ls -l /system/bin/reboot
- lrwxr-xr-x root shell 2010-11-03 02:16 reboot -> toolbox
- cat /proc/sys/kernel/osrelease
- 2.6.29
- getprop ro.product.model
- cs
- getprop ro.product.brand
- motorola
- getprop ro.product.name
- cs_NIIBR
- getprop ro.product.manufacturer
- motorola
- getprop ro.build.product
- i886
- Install rootkit: false
- Exploit delete success
Add Comment
Please, Sign In to add comment