so, you going to post a how-to???
i'm ready to see how it's done.
and if it's a sure thing, i can finally break down and buy the phone lol
Alright so this is how I did it. I call the kernel exploit the Unkn0wn Expliot. (Cheesy I know.) lol
One more interesting thing: After running the remount, I tried cydia impactor one time to see if it would stay permanent. It didn't but cydia impactor didn't throw an error. It completed.
-Downloaded the su binary (I used the one in your post, but was outdated)
-Push it to /sdcard using adb
-Run the telnet exploit on system using cydia impactor.
-Log into the system telnet
-Run some commands
-Now run: su (This will produce an interesting error message, saying that we need to be suid even though the binary is not installed)
-Type exit
-Run telnet exploit as root cydia impactor
-Log in via telnet again this time as root.
-Run su (There will be an error message about FIX ME. This is the exploit here).
-Now enter "cp" it will error saying it cannot be found.
-Now this is where the fun begins. You should see some numbers (ex: 127|root@android) next to the root@android. This is where we have caused a failure in the kernel and we can do just about anything now without it ignoring us.
- Run mount -o rw,remount /system (The exploit causes the kernel the accept the remount.)
-Run mount and make sure /sytem is rw, if not you might have to try this again. This happened to me when I skipped the system login
-Run busybox cp /sdcard/su /system/xbin/su (cp can't be found right after kernel exploit so this is the workaround. Not sure why)
-cd to /system/xbin
-give it the permissions. I used busybox chmod 06755 su on the time it worked.
-create symlink to /system/bin via ln -s /system/xbin/su /system/bin/su
-install supersu or superuser on phone and make sure it sees binary
-download root checker, it should report root access. That picture was not photo shopped. (I don't even own photo shop)
-have fun!
NOTE: Right now I haven't figured out how to survive reboots. But since we have true root temporary access thanks to the kernel exploit we can figure something out. I think I might try installing XPosed and create a module or something to do it. We could also create a shell script, save it to the phone, and have the kernel execute on boot. This is where the problem is.