• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root i'll help find a root method if...

Ok, good to know at least that hardware/rom differences aren't the problem. Is there any way to back up app data without root?

Actually I just remembered you mentioned using tar and bz2... I wonder if that would work from telnet at least. But then if rooting fails on the newly-refreshed phone, there wouldn't be a way to restore from that tar.

Did you ever get qpst to do a backup? Can it restore too?
 
Hmm, I thought things were progressing pretty fast here for a while... but now just silence! Oh well.

We are stuck at the moment. All known methods have failed, including update.zip method, which was used on the ZTE Merit.

Changes to the boot and recovery images are causing bricks... We are not alone in this... The ZTE Valet, ZTE Whirl, and ZTE Majesty have all been bricked by these type of changes...

And I am not good enough to modify the Xperia exploit to see if it will work for the Valet. Though there is no guarantee that even if someone does it won't cause a brick... :p

What we need to do is figure out for certain how the boot and recovery images are being verified and somehow disable or cripple it. Again, beyond me. :confused:
 
We are stuck at the moment. All known methods have failed, including update.zip method, which was used on the ZTE Merit.

Changes to the boot and recovery images are causing bricks... We are not alone in this... The ZTE Valet, ZTE Whirl, and ZTE Majesty have all been bricked by these type of changes...

And I am not good enough to modify the Xperia exploit to see if it will work for the Valet. Though there is no guarantee that even if someone does it won't cause a brick... :p

What we need to do is figure out for certain how the boot and recovery images are being verified and somehow disable or cripple it. Again, beyond me. :confused:

OK. And the Xperia exploit is interesting because it exploits the same bug that Cydia Impactor uses to gain temp root, so we know the Valet's vulnerable? Or is there some similarity between the phone models?
 
Actually I just remembered you mentioned using tar and bz2... I wonder if that would work from telnet at least. But then if rooting fails on the newly-refreshed phone, there wouldn't be a way to restore from that tar.

Did you ever get qpst to do a backup? Can it restore too?

mainefungi, I never got an answer from you about doing a backup with qpst (although I did see your post and pictures about using qpst itself).

Also, I thought I read somewhere that you used bz2 to back up the phone once you had temp root through the telnet exploit; but I can't find that now. Was that you, or someone else?
 
mainefungi, I never got an answer from you about doing a backup with qpst (although I did see your post and pictures about using qpst itself).

Also, I thought I read somewhere that you used bz2 to back up the phone once you had temp root through the telnet exploit; but I can't find that now. Was that you, or someone else?

I started a new job, which has kinda pulled me away from this endeavor for a bit. In theory it should work. And it should be able to restore that backup to recover from the types of bricks we have seen... I discovered QPST only because of my brick on my last phone. The phone installed itself as a "Qualcomm HS-USB QDLoader 9008", which I goggled, and that lead me to it.

There are some tutorials out there on how to use it, but I have not taken the time to try it.

EDIT: I have also not tried bz2. The root through the telnet exploit (both mine and unknownone's) have proven to be a bit unstable. Some root apps kill the root, and even some non-root apps... As such I have not messed with it for almost a week.
 
OK. And the Xperia exploit is interesting because it exploits the same bug that Cydia Impactor uses to gain temp root, so we know the Valet's vulnerable? Or is there some similarity between the phone models?

There are a couple of root methods for the Xperia. One uses bug #9950697, the other uses a another method (lookup CVE-2013-6282 vulnerability).

ZTE does not use the same kernel as the Xperia, so the CVE-2013-6282 vulnerability is out for us. The ZTE may have kernel vulnerabilities of it's own, but that is beyond my skills...

Cydia uses bug #9950697 for his Telnet exploit... So we know the Valet is vulnerable to it.

Also, according to the Bluebox Security Scanner app, the Valet has been patched for the bug 8219321 master key exploit, but has NOT been patched for bug 9695860. So there may be other options there too...

Again, both of these beyond my current skill set.
 
I'm working on an app that will run an exploit on boot. I'll post here sometime soonish if I can get something working. Wish me luck!

EDIT: Progress is going good. Successfully be able to issue a command as root. Not done yet. Some work work to do.

EDIT 2: Created new remount exploit. No more need for Cydia Impactor.

EDIT 3: Successfully started root telnet session through root-app.

EDIT 4: (2/19/2014): Very close, having some issues with pushing the su binary. Should be fixed soonish

EDIT 5: (2/27/2014): Exploit now starts on boot, redid su binary push code. Untested, but completed

EDIT 6: (3/12/2014): Real life problems have prevented testing, will get a chance today. Minor fixes and security fix. Source is available on github: https://github.com/Unkn0wn0ne/RootMyValet
 
Good afternoon. I've had a chat with live support for tracfone reguarding rooting the phone this is what the CSR said " Let us inform you that we do not offer or support that option, also we do not recommended because the phone will lose its warranty. "
Nothing suprising. He also confirmed they offer no public developer information or material. He did state that, Rooting will not effect the TMFL standing of the phone nor get it blacklisted.

Anyway, All in for getting a root for this phone. Will have one here in a few days. And it being $10 more than my monthly bill currently is, Getting another incase of a brick isn't a huge deal. (You can pick one up for $60 on ebay right now or $70 w/ a 200 min card)
 
I'm working on an app that will run an exploit on boot. I'll post here sometime soonish if I can get something working. Wish me luck!

EDIT: Progress is going good. Successfully be able to issue a command as root. Not done yet. Some work work to do.

EDIT 2: Created new remount exploit. No more need for Cydia Impactor.

EDIT 3: Successfully started root telnet session through root-app.

EDIT 4: (2/19/2014): Very close, having some issues with pushing the su binary. Should be fixed soonish

Any progress on this? I REALLY wanna root this phone.
 
Any updates? I have the Trident case for my Valet. Nice case. The screen protector is nice. But the ZTE Director logo on the bottom of the screen protector needs to go.
 
Is there any new on the progress of the Root?

I am willing to help...



Oh, Also the account that I am using is a bugmenot account so I don't expect it to be permanent...


I have one and tried one root solution but it failed.

Then I found this thread and read the entire thing! (whew)
 
How are things going with root unknown one?

Well, I've made some more changes to the app that I have to test before I finish it. The biggest issue right now is I can achieve a root telnet session, but I've had trouble piping the commands to the telnet session via the app.

I'll figure something out soonish.

You all can check the progress here:
https://github.com/Unkn0wn0ne/RootMyValet
 
Is there any new on the progress of the Root?

I am willing to help...



Oh, Also the account that I am using is a bugmenot account so I don't expect it to be permanent...


I have one and tried one root solution but it failed.

Then I found this thread and read the entire thing! (whew)

See the post two posts up.
 
I'll wait until unknownone has things perfected. Well all that is needed is for it to be compiled like the message that is below mine.
 
I'm working on an app that will run an exploit on boot. I'll post here sometime soonish if I can get something working. Wish me luck!

EDIT: Progress is going good. Successfully be able to issue a command as root. Not done yet. Some work work to do.

EDIT 2: Created new remount exploit. No more need for Cydia Impactor.

EDIT 3: Successfully started root telnet session through root-app.

EDIT 4: (2/19/2014): Very close, having some issues with pushing the su binary. Should be fixed soonish

EDIT 5: (2/27/2014): Exploit now starts on boot, redid su binary push code. Untested, but completed

EDIT 6: (3/12/2014): Real life problems have prevented testing, will get a chance today. Minor fixes and security fix. Source is available on github: https://github.com/Unkn0wn0ne/RootMyValet

Can you compile that into an APK?
 
Back
Top Bottom