okee dokee, and just make sure the files are in the correct folders etc.
I know you are careful in checking, I'm sure, just re-iterating that's all.
Ok, I took the time to try and do this again with extremely detailed process and results. Note, I did not do a stock reset on my phone so I thought I'd point this out. Any how, here we go:
Step 1: downloaded and installed "HTC Sync 3.0.5551" on Windows 7 64bit (declined the request to update soon after installation)
Step 2: Contents of android folder on my desktop:
162,816 adb.exe
70,144 fastboot.exe
96,256 AdbWinApi.dll
Step 3: Extraction and copy of CunningLogic-TacoRoot-3b6fae6 to android folder on my desktop:
2,129 tacoroot.sh
Step 4: Files copied to the root of my SDCARD when instructed to in the guide (step 4):
76,044 flash_image
655,360 mtd-eng.img
211,823,071 PC36IMG.zip (renamed correctly and verified from command prompt from the following file:
PC36IMG_SuperSonic_S_Sprint_WWE_3.70.651.1_Radio_2.15.00.11.19_NV_1.90_release_161482_signed.zip
Step 5: Stock recovery mode:
a) Powered phone down
b) Rebooted phone pressing [power] + [down]
* Results: Locked menu with S-ON and HBOOT-2.18.0001, etc... came up with choices of: [FASTBOOT, RECOVERY, CLEAR STORAGE, SIMLOCK, HBOOT USB]
c) Selected recovery (phone rebooted again) - [DOWN] then [POWER]
* Results: Phone rebooted
d) At triangle with exclamation point, pressed: [power] + [up] + [down] buttons
* Results: Android system recovery <3e> menu appeared! Selected "Reboot system now"
* NOTE: before selecting "Reboot system now", the bottom of screen said in yellow: "E:Can't open /cache/recovery/command"
Step 6: Connect the phone to the pc via the usb cable and performed/verified following steps
* NOTE: I immediately plugged the cable in just before phone reboot occurred. Is this correct?):
a) charge only mode verified
* Result: Done
b) usb debugging turned on: settings>apps>development>check usb debugging
* Result: Verified
c) fastboot is disabled: settings>apps>uncheck fastboot
* Result: Verified
Steps 7-9: ABD Commands:
* Results:
* NOTE: To avoid the out of date adb.exe message, I killed adb.exe first
<==
C:\Users\yeffocb\Desktop\android>adb push tacoroot.sh /data/local/
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
15 KB/s (2129 bytes in 0.130s)
C:\Users\yeffocb\Desktop\android>adb shell chmod 755 /data/local/tacoroot.sh
C:\Users\yeffocb\Desktop\android>adb shell /data/local/tacoroot.sh --setup
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by
both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least once after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into recovery, please press Volume+, Volume- and Power at the same time, and reboot the system.
==>
* NOTE: Followed instructions on screen - Pressed [vol+] + [Vol-] + [Power]
* Results: Android system recovery <3e> menu came up. Selected "Reboot system now" - Phone rebooted
Step 10: adb shell /data/local/tacoroot.sh --root:
* Results:
<==
C:\Users\yeffocb\Desktop\android>adb shell /data/local/tacoroot.sh --root
adb server is out of date. killing...
* daemon started successfully *
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by
both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least once after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into root.
==>
Steps 11-13 : ABD Shell and UNIX commands:
* Results:
<==
C:\Users\Bob\Desktop\android>adb shell
adb server is out of date. killing...
* daemon started successfully *
# cat /sdcard/flash_image > /data/flash_image
cat /sdcard/flash_image > /data/flash_image
/sdcard/flash_image: No such file or directory
# chmod 755 /data/flash_image
chmod 755 /data/flash_image
# /data/flash_image misc /sdcard/mtd-eng.img
/data/flash_image misc /sdcard/mtd-eng.img
# /data/local/tacoroot.sh --undo
/data/local/tacoroot.sh --undo
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by
both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least once after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Root removed, rebooting
==>
Step 14: Rename PC36IMG_SuperSonic_S_Sprint_WWE_3.70.651.1_Radio_2.15.00.11.19_NV_1.90_release_161482_signed.zip to PC36IMG.zip
* Results: Done
Step 15: Copy PC36IMG.zip to root of SDCARD:
* Results: Done
Step 16: Power off phone and power back on with [power] + [down]:
* Results: Rebooted, Bootloader menu came up and PC36IMG.zip file is loading
Under the word HBOOT, I see:
Main Version is older!
Update Fail!
Do you want to reboot device?
<VOL UP> Yes
<VOL DOWN> No
* Final Results: I appeared to do a little better this time, but the failed results were the same. The problem appears to be with this:
cat /sdcard/flash_image > /data/flash_image
/sdcard/flash_image: No such file or directory
* NOTE: It just can't find the /sdcard/flash_image file to cat to /data/flash_image. I suspect that this might be the file that tells the system that the file is not older. Is this correct? Any suggestions?