Well i fixed the problem guys, told you i would be of some help.
Just a few days in and i can start to contribute now.
If you have randomly been un rooted and can no longer use one click root, here is the solution.
1. put device in debugging mode
2. Open command Prompt
3. Cd to the one click root folder, i would move it to the c driver and rename to make it easier.
4. Type Cd C:/test
5. Than type Adb shell
6. Than type SU
7. Than you need to mount the system folder as read and write so type this
mount -o remount,rw -t yaffs2 /dev/block/mtdblock3 /system
8. Than you need to navigate to the super user file by typing
cd system/bin
9. Type chmod 6755 su
press enter
Restart and your rooted again.
This did not work. I even uninstalled and reinstalled the driver4s for my phone and this is what i get at the command prompt
C:\LGEsteem>dir
Volume in drive C is DRIVE_C
Volume Serial Number is ****-****
Directory of C:\LGEsteem
10/23/2011 08:34 PM <DIR> .
10/23/2011 08:34 PM <DIR> ..
10/08/2011 02:33 PM 578,611 adb.exe
10/08/2011 02:33 PM 96,256 AdbWinApi.dll
10/08/2011 02:33 PM 60,928 AdbWinUsbApi.dll
10/03/2011 09:01 PM 1,867,568 busybox
10/08/2011 03:59 PM 2,577 run.bat
10/08/2011 12:27 AM 26,324 su
10/08/2011 12:27 AM 196,120 Superuser.apk
10/07/2011 05:13 PM 22,281 zergrush
8 File(s) 2,850,665 bytes
2 Dir(s) 141,884,305,408 bytes free
C:\LGEsteem>Adb shell
$ su
su
Permission denied
$
When i try to run this i get a popup that Unknown was denied SuperUser Permissions
When i try to re-run the One Click this is the results.
[*] LG Esteem root script (Windows version)
[*] Exploit copyright (C) 2011 Revolutionary
[*] Scripting for LG Esteem by Dan Rosenberg (@djrbliss)
[*]
[*] Before continuing, ensure USB debugging is enabled, that you
[*] have the latest LG drivers installed, and that your phone is
[*] connected via USB.
[*]
[*] Press enter to root your phone...
Press any key to continue . . .
[*]
[*] Waiting for device...
* daemon not running. starting it now *
* daemon started successfully *
[*] Device found.
[*] Pushing exploit binary...
494 KB/s (22281 bytes in 0.044s)
[*] Running exploit...
[**] Zerg rush - Android 2.2/2.3 local root
[**] (C) 2011 Revolutionary.
[**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew.
[+] Found a GingerBread ! 0x00017118
[*] Sending 149 zerglings ...
[*] Trying a new path ...
[*] Sending 149 zerglings ...
[*] Trying a new path ...
[*] Sending 149 zerglings ...
[*] Trying a new path ...
[*] Sending 149 zerglings ...
[+] Zerglings caused crash (good news): 0x40121cd4 0x0054
[*] Researching Metabolic Boost ...
[+] Speedlings on the go ! 0xafd25611 0xafd390bf
[*] Poping 24 more zerglings
[*] Sending 173 zerglings ...
[+] Rush did it ! It's a GG, man !
[*] Installing root tools...
756 KB/s (26324 bytes in 0.034s)
929 KB/s (1867568 bytes in 1.961s)
957 KB/s (196120 bytes in 0.200s)
link failed File exists
[*] Cleaning up...
[*] Rebooting...