Advertisement
Guest User

Untitled

a guest
Jun 22nd, 2017
768
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.11 KB | None | 0 0
  1. Microsoft Windows [Version 6.1.7600]
  2. Copyright (c) 2009 Microsoft Corporation. All rights reserved.
  3.  
  4. C:\Users\Beezie>cd c:/tools
  5.  
  6. c:\tools>adb shell
  7. * daemon not running. starting it now on port 5037 *
  8. * daemon started successfully *
  9. $ exit
  10. exit
  11.  
  12. c:\tools>adb push c:\downloads\zImage /data/local/tm/zImage
  13. 1774 KB/s (5061880 bytes in 2.786s)
  14.  
  15. c:\tools>adb push c:\downloads\flash_image /data/local/tmp/flash_image
  16. 115 KB/s (9720 bytes in 0.082s)
  17.  
  18. c:\tools>adb push c:\downloads\zImage /data/local/tmp/zImage
  19. 1815 KB/s (5061880 bytes in 2.723s)
  20.  
  21. c:\tools>adb push c:\downloads\rage.bin /data/local/tmp/rage.bin
  22. 119 KB/s (5392 bytes in 0.044s)
  23.  
  24. c:\tools>adb push c:\downloads\recovery.bin /data/local/tmp/recovery.bin
  25. 1707 KB/s (5326568 bytes in 3.047s)
  26.  
  27. c:\tools>adb shell
  28. $ cd /data/local/tmp
  29. cd /data/local/tmp
  30. $ chmod 755 flash_image
  31. chmod 755 flash_image
  32. $ chmod 755 rage.bin
  33. chmod 755 rage.bin
  34. $ ./rage.bin
  35. ./rage.bin
  36. [*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
  37.  
  38. [*] checking NPROC limit ...
  39. [+] RLIMIT_NPROC={1344, 1344}
  40. [*] Searching for adb ...
  41. [+] Found adb as PID 1894
  42. [*] Spawning children. Dont type anything and wait for reset!
  43. [*]
  44. [*] If you like what we are doing you can send us PayPal money to
  45. [*] 7-4-3-C@web.de so we can compensate time, effort and HW costs.
  46. [*] If you are a company and feel like you profit from our work,
  47. [*] we also accept donations > 1000 USD!
  48. [*]
  49. [*] adb connection will be reset. restart adb server on desktop and re-login.
  50. $
  51.  
  52. c:\tools>adb shell
  53. # cd /data/local/tmp
  54. cd /data/local/tmp
  55. # ./flash_image boot zImage
  56. ./flash_image boot zImage
  57. bml_scan_partitions start!
  58. XSR VERSION: 1.5.2-p4
  59.  
  60. minor position size blocks id
  61. 1: 0x00000000-0x00020000 0x00020000 1 0
  62. 2: 0x00020000-0x00160000 0x00140000 10 1
  63. 3: 0x00160000-0x001c0000 0x00060000 3 2
  64. 4: 0x001c0000-0x00800000 0x00640000 50 3
  65. 5: 0x00800000-0x09e00000 0x09600000 1200 4
  66. 6: 0x09e00000-0x17b80000 0x0dd80000 1772 5
  67. 7: 0x17b80000-0x1ef00000 0x07380000 924 6
  68. 8: 0x1ef00000-0x1f540000 0x00640000 50 7
  69.  
  70. (0) bad mapping information
  71. No BadBlock RsvBlock
  72. 0: 190 4014
  73. 1: 2014 4015
  74. 2: 2293 4016
  75. 3: 2949 4017
  76. 4: 3061 4018
  77. 5: 3564 4019
  78.  
  79. 1: 20000 1 boot12: 140000 10 boot23: 60000 3 boot34:
  80. 640000 50 boot5: 9600000 1200 system6: dd80000 1772 data7: 7
  81. 380000 924 cache8: 640000 50 recoveryflash_image] bml_read_data : 204
  82. 8 bytesflashing boot from zImagebml_write_partition: /dev/block/bml4 open, index
  83. : 4
  84. BML ready..!!
  85. boot partition unlock, bmlid : 4
  86. boot partition erase, bmlid : 4
  87. flash_image] bml_write_dataLast bytes wrote 2048, len : 1272Write Result : 5061
  88. 880 kbytes#
  89.  
  90. # reboot
  91. reboot
  92.  
  93. c:\tools>adb shell
  94. $ su
  95. su
  96. su: permission denied
  97. $ cd /data/local/temp
  98. cd /data/local/temp
  99. cd: can't cd to /data/local/temp
  100. $ cd /data/local/tmp
  101. cd /data/local/tmp
  102. $ ./rage.bin
  103. ./rage.bin
  104. [*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
  105.  
  106. [*] checking NPROC limit ...
  107. [+] RLIMIT_NPROC={1344, 1344}
  108. [*] Searching for adb ...
  109. [+] Found adb as PID 1924
  110. [*] Spawning children. Dont type anything and wait for reset!
  111. [*]
  112. [*] If you like what we are doing you can send us PayPal money to
  113. [*] 7-4-3-C@web.de so we can compensate time, effort and HW costs.
  114. [*] If you are a company and feel like you profit from our work,
  115. [*] we also accept donations > 1000 USD!
  116. [*]
  117. [*] adb connection will be reset. restart adb server on desktop and re-login.
  118. $
  119.  
  120. c:\tools>adb shell
  121. # cd /system/usr keylayout
  122. cd /system/usr keylayout
  123. cd: bad substitution
  124. # cd /system/usr/keylayout
  125. cd /system/usr/keylayout
  126. # ls
  127. ls
  128. AVRCP.kl s3c-keypad-rev001a.kl s3c-keypad-rev0050.kl
  129. qwerty.kl s3c-keypad-rev0020.kl sec_headset.kl
  130. s3c-keypad-rev0000.kl s3c-keypad-rev0030.kl
  131. s3c-keypad-rev0010.kl s3c-keypad-rev0040.kl
  132. # cp -r /system/usr/keylayout /sdcard/keylayout
  133. cp -r /system/usr/keylayout /sdcard/keylayout
  134. #
  135. c:\tools>adb shell
  136. * daemon not running. starting it now on port 5037 *
  137. * daemon started successfully *
  138. $ su
  139. su
  140. su: permission denied
  141. $ cd /data/local/tmp
  142. cd /data/local/tmp
  143. $ ./rage.bin
  144. ./rage.bin
  145. [*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
  146.  
  147. [*] checking NPROC limit ...
  148. [+] RLIMIT_NPROC={1344, 1344}
  149. [*] Searching for adb ...
  150. [+] Found adb as PID 4897
  151. [*] Spawning children. Dont type anything and wait for reset!
  152. [*]
  153. [*] If you like what we are doing you can send us PayPal money to
  154. [*] 7-4-3-C@web.de so we can compensate time, effort and HW costs.
  155. [*] If you are a company and feel like you profit from our work,
  156. [*] we also accept donations > 1000 USD!
  157. [*]
  158. [*] adb connection will be reset. restart adb server on desktop and re-login.
  159. $
  160. c:\tools>adb shell
  161. # run redbend_ua restore /dev/blocl/bml5 zImage
  162. run redbend_ua restore /dev/blocl/bml5 zImage
  163. run: not found
  164. # redbend_ua restore /dev/blocl/bml5 zImage
  165. redbend_ua restore /dev/blocl/bml5 zImage
  166. RedBend Update Agent 6,1,7,10
  167. commands:
  168. img [partition name] [delta file] [device node] [temp path]
  169. fs [partition name] [delta file] [mount point] [temp path]
  170. png [png file name]
  171. all
  172. # redbend_ua restore /dev/block/bml5 zImage
  173. redbend_ua restore /dev/block/bml5 zImage
  174. RedBend Update Agent 6,1,7,10
  175. commands:
  176. img [partition name] [delta file] [device node] [temp path]
  177. fs [partition name] [delta file] [mount point] [temp path]
  178. png [png file name]
  179. all
  180. # redbend_ua restore zImage /dev/block/bml5
  181. redbend_ua restore zImage /dev/block/bml5
  182. RedBend Update Agent 6,1,7,10
  183. commands:
  184. img [partition name] [delta file] [device node] [temp path]
  185. fs [partition name] [delta file] [mount point] [temp path]
  186. png [png file name]
  187. all
  188. # redbend_wa
  189. redbend_wa
  190. redbend_wa: not found
  191. # redbend_ua
  192. redbend_ua
  193. RedBend Update Agent 6,1,7,10
  194. commands:
  195. img [partition name] [delta file] [device node] [temp path]
  196. fs [partition name] [delta file] [mount point] [temp path]
  197. png [png file name]
  198. all
  199. #
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement