Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Probably just installed a virus on my computer and phone lol
I got the file from SRS root websiteThey are saying someone has copied the srsroot and it's going by srs-root. So be weary .
I tweeted @ them. But no responseI just tried on b08. it goes through the process then reboots the phone but does not root although says root successful. Does anyone know if they're on xda like the kingroot team. I'd like to contact them and let them know it's not working and see what they say. I know it's a long shot but still think it's worth trying.
It was one of many things I tried. I had the same result. They said on Twitter they can root this phone since day 1.. but I did read somewhere that the whole site and everything they say is a scam cause they claim to root phone as soon as the phone comes out but other users keep getting the same results.. I personally think the key is in spoofing the OTA. I extracted the SuperSU folder and things got a bit confusing. I also agree that the OTA is not that unique. If that was the cast, why would ZTE or metro add the install update from Sd in settings..I just tried on b08. it goes through the process then reboots the phone but does not root although says root successful. Does anyone know if they're on xda like the kingroot team. I'd like to contact them and let them know it's not working and see what they say. I know it's a long shot but still think it's worth trying.
You may be right. after going through their tweets I found some phones that to my knowledge are still not rooted. Sorry guys. I should have looked into them more before posting. I don't think they're a complete scam because their software is free and worked on my old phone but I'm no longer convinced that they are completely legitimate either. Guess that's a no go. I'll edit or delete my old post. Still, I think it's a good thing to try every avenue available. At the very least we will have a very long list of things that don't work. That's better than nothing imo.It was one of many things I tried. I had the same result. They said on Twitter they can root this phone since day 1.. but I did read somewhere that the whole site and everything they say is a scam cause they claim to root phone as soon as the phone comes out but other users keep getting the same results.. I personally think the key is in spoofing the OTA. I extracted the SuperSU folder and things got a bit confusing. I also agree that the OTA is not that unique. If that was the cast, why would ZTE or metro add the install update from Sd in settings..
I'm actually glad SRS root came up.. we sometimes forget to update the community on what has been tried. I also tried something I think is called Baidu root and pingpong root to no success.. keep exploring..You may be right. after going through their tweets I found some phones that to my knowledge are still not rooted. Sorry guys. I should have looked into them more before posting. I don't think they're a complete scam because their software is free and worked on my old phone but I'm no longer convinced that they are completely legitimate either. Guess that's a no go. I'll edit or delete my old post. Still, I think it's a good thing to try every avenue available. At the very least we will have a very long list of things that don't work. That's better than nothing imo.
The Asianrocker says Ya'll Won't Give Him No Love...Is the mbn file something you can use to root? I saw it. ITs saying it contains files in what I believe is what you need to root...
http://forum.xda-developers.com/showthread.php?t=2799160
I don't know why you are ignoring this idea coz I know I am on the right track. Look what I found:
http://forum.xda-developers.com/showthread.php?t=2641245
IT works come on now, will post this on xda. Maybe someone will be interested there since you all are ignoring me.



MaybeThe Asianrocker says Ya'll Won't Give Him No Love...
I was posting my opinions on this subject at a different site.. and the Rocker claimed he was "in"..
I've asked him to post a step by step for me.. since he says he knows the way in.. but, doesn't want root for himself because he wants to be ready for the Android N update.. I'll be sure to post my success should I make it to the *other side*![]()
The Asianrocker says Ya'll Won't Give Him No Love...
I was posting my opinions on this subject at a different site.. and the Rocker claimed he was "in"..
I've asked him to post a step by step for me.. since he says he knows the way in.. but, doesn't want root for himself because he wants to be ready for the Android N update.. I'll be sure to post my success should I make it to the *other side*![]()
I had the original ZTE ZMAX. We had a ZTEROOT and some switchers. We were in about the same situation as this. That ZTEROOT wouldn't work for this phone?
Figured as much, my bad.dude all that old basic shit has been tried since day 1.
Been using dirtycow and attempting to flash twrp using the method here:
http://forum.xda-developers.com/showpost.php?p=69312919&postcount=148
The exploit does work:
![]()
I've tried everything I could think of but I'm burnt out & done for today.
Maybe you guys (possibly who OTA'd?) will have better luck.
Here's a zip with: dirtycow, cow-applypatch-flash, & Messi"s extracted twrp.img
https://goo.gl/ZzSf72
Here's the commands from the link:
Everything seems to work fine except, adb reboot recovery, boots the stock recovery.
- adb push twrp.img /sdcard/recovery.img
- adb push dirtycow /data/local/tmp
- adb push cow-applypatch-flash /data/local/tmp
- adb shell
- $ chmod 0777 /data/local/tmp/*
- $ /data/local/tmp/dirtycow /system/bin/applypatch /data/local/tmp/cow-applypatch-flash
- $ setprop ctl.start flash_recovery
- $ logcat | grep cow (you can see flash progress or failure with this)
- wait ~60 seconds
- TWRP is installed!
Its worth mentioning that this will only work with an unlocked boot-loader. Lets hope
that's not the problem here.
Shouldn't twrp.img be recovery.img?Been using dirtycow and attempting to flash twrp using the method here:
http://forum.xda-developers.com/showpost.php?p=69312919&postcount=148
The exploit does work:
![]()
I've tried everything I could think of but I'm burnt out & done for today.
Maybe you guys (possibly who OTA'd?) will have better luck.
Here's a zip with: dirtycow, cow-applypatch-flash, & Messi"s extracted twrp.img
https://goo.gl/ZzSf72
Here's the commands from the link:
Everything seems to work fine except, adb reboot recovery, boots the stock recovery.
- adb push twrp.img /sdcard/recovery.img
- adb push dirtycow /data/local/tmp
- adb push cow-applypatch-flash /data/local/tmp
- adb shell
- $ chmod 0777 /data/local/tmp/*
- $ /data/local/tmp/dirtycow /system/bin/applypatch /data/local/tmp/cow-applypatch-flash
- $ setprop ctl.start flash_recovery
- $ logcat | grep cow (you can see flash progress or failure with this)
- wait ~60 seconds
- TWRP is installed!
Its worth mentioning that this will only work with an unlocked boot-loader. Lets hope
that's not the problem here.
Shouldn't twrp.img be recovery.img?
Irregardless, still didn't work. Tried both ways