Noobified
Android Enthusiast
Have you all tried this yet? https://github.com/jcadduono/android_external_dirtycowthanks for clearifying the situation, i contacted him this morning , i hope to get a reply soon .
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Have you all tried this yet? https://github.com/jcadduono/android_external_dirtycowthanks for clearifying the situation, i contacted him this morning , i hope to get a reply soon .
How do you know your bootloader is locked? The absence of a bootloader interaction? This would be the first MetroPCS device with a locked bootloader. From my knowledge of ZTE they don't typically ship a bootloader you can interact with. But the fact that it allows a root shell you all could flash the twrp and see. As far as I know you won't be bricked the bootloader only cares about the partition booting so if recovery signature didn't match it would reboot and the boot would still proceed to system and you could of course reflash the stock recovery.img again.you need an unlocked bootloader for this to work
You also need to have an unlocked bootloader in order to be able to install twrp or even to just have root, so if you truly believe the bootloader is locked down then why are you here? As I've said many many times the people at ZTE don't know jack shit about whether the bootloader is locked or not. I know this first hand because they falsely told me that the bootloader was locked on the first zmax when I contacted them in the past.you need an unlocked bootloader for this to work
These people are parroting misinformation spread by the customer service idiots at ZTE who don't even know what a locked bootloader is. I swear if I see one more person assume the bootloader is locked just because someone at ZTE says so I'm going to lose it.How do you know your bootloader is locked? The absence of a bootloader interaction? This would be the first MetroPCS device with a locked bootloader. From my knowledge of ZTE they don't typically ship a bootloader you can interact with. But the fact that it allows a root shell you all could flash the twrp and see. As far as I know you won't be bricked the bootloader only cares about the partition booting so if recovery signature didn't match it would reboot and the boot would still proceed to system and you could of course reflash the stock recovery.img again.
here u goCan someone give me a list of the ramdisk contents? From adb shell or terminal emulator just type ls you'll see init.rc init.qcom.rc init.target.rc etc. Screenshot however you want just include all .rc files
Just like the Axon 7 init.qcom.ftm.rc is not used we can override this file with dirtcow and set the device permissive I'm testing this now I had to recompile the exploit to work for my device. I'll let you all know if it works. I'm unrooted as well for testing.here u go
shell@urd:/ $ ls
ls
acct
cache
charger
config
d
data
default.prop
dev
dsp
etc
file_contexts
firmware
fstab.ftm.qcom
fstab.qcom
init
init.carrier.rc
init.class_main.sh
init.environ.rc
init.fingerprint.goodix_fp.rc
init.fingerprint.synafp.rc
init.ftm.rc
init.mdm.sh
init.offcharge.rc
init.qcom.bms.sh
init.qcom.class_core.sh
init.qcom.early_boot.sh
init.qcom.factory.rc
init.qcom.ftm.rc
init.qcom.rc
init.qcom.sh
init.qcom.ssr.sh
init.qcom.syspart_fixup.sh
init.qcom.usb.rc
init.qcom.usb.sh
init.rc
init.recovery.qcom.rc
init.target.ftm.rc
init.target.rc
init.trace.rc
init.usb.configfs.rc
init.usb.rc
init.vendor.rc
init.zygote32.rc
init.zygote64_32.rc
mnt
oem
persist
proc
property_contexts
res
root
sbin
sdcard
seapp_contexts
selinux_version
sepolicy
service_contexts
storage
sys
system
tombstones
ueventd.qcom.rc
ueventd.rc
vendor
verity_key
yea i can see that we need to edit this line https://github.com/jcadduono/android_external_dirtycow/blob/android-6.0/recowvery-applypatch.c#L46Just like the Axon 7 init.qcom.ftm.rc is not used we can override this file with dirtcow and set the device permissive I'm testing this now I had to recompile the exploit to work for my device. I'll let you all know if it works. I'm unrooted as well for testing.
lol which one is the used init...ignore
I ended up using init.fingerprint.goodix_fp.rc because the file is shorter. The thing about that is you all have to have the goodix fp sensor. Can you cat init.fingerprint.goodix_fp.rc and getprop ro.build.fingerprint_hw to ensure we have the same sensor.lol which one is the used init
init.ftm or init.qcom.ftm or init.qcom ?
i got permission denied for the first cmd and goodix_fp for the second cmdI ended up using init.fingerprint.goodix_fp.rc because the file is shorter. The thing about that is you all have to have the goodix fp sensor. Can you cat init.fingerprint.goodix_fp.rc and getprop ro.build.fingerprint_hw to ensure we have the same sensor.
Doesn't work on the Axon 7 I spent hours and it will not let the init set it permissive.i got permission denied for the first cmd and goodix_fp for the second cmd
The same on the zmax pro , i tried with init.qcom.rc and it didn't work on reboot it's still enforcing...Doesn't work on the Axon 7 I spent hours and it will not let the init set it permissive.
does anyone understand Chinese or at least code in mandarin or at least Cantonese, or Taiwanese, etc,,,, just give us a shot...
need some help here ... the regular adb connection protocols are useless....
You haven't encountered the issue where writing the fill puts the wrong data inside? I finally caught why my image didn't boot the beginning of the file is wrote incorrectly and so is the last bytesThe same on the zmax pro , i tried with init.qcom.rc and it didn't work on reboot it's still enforcing...
I'm patient as can be. I'm by know means a dev but some think that if a root hasn't been discovered this far into the release that it's not going to happen. I've been rooted or jailbroke since 2008 when the 2nd iPhone first came out. Than went to the Android world in 2014. It is killing me not being able to do what I want with the phone
There really isn't any way of knowing that for sure. It took several months for the first zmax to get root.I'm patient as can be. I'm by know means a dev but some think that if a root hasn't been discovered this far into the release that it's not going to happen. I've been rooted or jailbroke since 2008 when the 2nd iPhone first came out. Than went to the Android world in 2014. It is killing me not being able to do what I want with the phone
Means, nothing i got to 95 two days back, if it doesn't root its not going to, the percentage means nothing.70% tested on my Z981