• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root Want root?

Status
Not open for further replies.
lol ill do a backflip from happiness and record it if someone roots it, it'll be funny cuz i cant do a backflip and ill break my head, but ill be recording from my ROOTED ALLY!

and back to business::::
kfazz: Check this out, the guys there have an extractor for wdb file, its for a diff LG phone but since they're both LG who knows???
How To Extract Custom Files From The Firmware!


---ill try extrating it with ubuntu linux it should take on encrypted files easier than windows systems
thanks Vmanisme, but that was the extractor that i tried. it appears the newer versions of the LG updater use a different dll structure, and my reverse engineering skills aren't up to par to figure it out. maybe if anyone knows french we could contact the developers of that prog, but it's a question of if not when, once we get ahold of the source, we can build our own kernels, and we're good. :)
 
thanks Vmanisme, but that was the extractor that i tried. it appears the newer versions of the LG updater use a different dll structure, and my reverse engineering skills aren't up to par to figure it out. maybe if anyone knows french we could contact the developers of that prog, but it's a question of if not when, once we get ahold of the source, we can build our own kernels, and we're good. :)

Well while searching around I found that this is a Microsoft works extension? Aparantly you can reconvert it? Or I just didn't get it? What am i suppose to find after extracting it?
 
it just happens to have the same extension name, not the same data format. all versions of lg-utils fail to extract. my guess is the wdb file has the flash image, and other bits , say maybe radio firmware (judging from strings in the .wdh file) and it's encrypted so we can't mess with it. the dll file included with the firmware probably probably has the extracting routines, but the structure is different from what lg-utils understands.
 
There looks to be a different version of that IFWD_DownloadDll.dll file, it's larger anyway:

MEGAUPLOAD - The leading online storage and file delivery service

See if that has any affect on the outcome. I tried to use your link above with my MEID, but it just gives me back an XML file, and I can't download the actual firmware file so I can't test that new DLL.
check the XML file in a text editor, the link should be inside, just copy paste to address bar after retrieving the xml. for me it showed up in plain text in firefox.

I received a reply from LG, i should have access to the source in about a week.
 
check the XML file in a text editor, the link should be inside, just copy paste to address bar after retrieving the xml. for me it showed up in plain text in firefox.

I received a reply from LG, i should have access to the source in about a week.

yeah there's gonna be 2 links in there, download the bottom one... well... you can try the top one but it said that access was denied, for me
 
the unlock code on the LG GW620 Eve is EVE&ADAM&&620LOVE!
( XDADeveloperWiki - LG Eve had lots of LG 620 Eve info )

Various parts of the codes that Heffe listed above and on the lgallyforums site do appear in the linux "strings" search ... "strings '/LG Droid Ally System Dump/app/Phone.odex' " ... but the storage arrangement of those strings (my amnesia is kicking in, but I remember that "#*#*" and "*#*#" were there) when viewed in their raw positions shows that they are often array elements to be referenced by array-position. The numbers or various pieces of them do not appear, nor do they appear in whole or in part when hex-converted and searched against the hex state of that same file. (ARGH ... just realized that I may or may not have an endian-ness problem ... I piped things into `hexdump` and there are issues of byte-order ... so ... does anyone know if the Ally is a big-endian or little-endian type?)

I am of the belief, possibly mistakenly, that this is the proper file to eyeball-search the strings output of, since as far as I can tell this is the only location where the dialer-access-codes are processed. [ Hmm ... as I'm writing all this and trying things, I've realized that I am mistaken at least as far as Eve evidence goes ]

/storage/Ally/Eve/LG_eve_backup_app_folder/backup# ( for file in `ls -1 *odex` ; do echo =-=-= $file =-=-= ; strings $file | egrep 620 | egrep -v bbd30e620c188ae ; done ) | less
=-=-= Contacts.odex =-=-=
*#620#
*748#620#
2945#*620#
3845#*620#
=-=-= Phone.odex =-=-=
2945#*620#

/storage/Ally/LG Droid Ally System Dump/app# strings Contacts.odex | egrep '[0-9]' | egrep \#
*#06#
(that's it ... the Ally Contacts.odex is distinctly under-populated)
*#06# just tells you your MEID number

/storage/Ally/LG Droid Ally System Dump/app# ( for file in `ls -1 *odex` ; do echo =-=-= $file =-=-= ; strings $file | egrep [0-9] | egrep \# ; done ) | less
=-=-= HiddenMenu.odex =-=-=
##2342#
##2539#
##33284#
##4773579#
##72786#
##786#
##8378#


This might be more interesting ...
##33284# is also another DEBUG ... brings up a service-code box = 000000 ... seems to do nothing obvious (maybe some input there will do something ... unclear as yet

##4773579# ... 000000
GPS CLRX
PDE Server URL
PDE server port

##72786#
SCRTN
MDN ... MDN will be changed back to factory default value
MSID ... MSID will be changed back to factory default value
Slot 1 NAI ... Slot 1 NAI will be changed back to factory default value
Slot 1 NAI Password ... Slot 1 NAI Password will be changed back to factory default value

##786#
RTN
RTN ... restore all preloaded applications to their factory default versions

##8378# ... 000000
Test
Test

I do wonder what *other* service codes there might be ... I only ever used 000000

Also, ##2539# and ##2342# acted as if I should have been making a call ... perhaps they chain with another number ... I've never done this before, so I have no idea what paradigms LG or others may follow here, I'm flying blind.

/storage/Ally/LG Droid Ally System Dump/app# ( for file in `ls -1 *odex` ; do echo =-=-= $file =-=-= ; strings $file | egrep -i super ; done ) | less
=-=-= CalendarWidget.odex =-=-=
ROOT_ACCESS
=-=-= CertInstaller.odex =-=-=
mRootMonitor
root
=-=-= LGHome.odex =-=-=
getSuperState
superState
=-=-= Launcher2.odex =-=-=
getSuperState
superState
=-=-= Settings.odex =-=-=
getSuperState
superState



There are too many things to eyeball search all at once, especially when I have little idea what keywords or paradigms to seek ...

if anyone knowledgable wants to give this a shot, probably it's best to start with
strings VerizonHiddenMenu.odex | less
strings HiddenMenu.odex | less
strings Phone.odex | less
strings Contacts.odex | less


~/Ally/LG Droid Ally System Dump/app# strings *odex | egrep 740
VS740AV5_2.1r2
vs740
VS740
LG VS740
access$7400
VS740MV5.5210.1011

~/Ally/LG Droid Ally System Dump/app# strings *odex | egrep -i ally
(nothing useful ... things like "setLoadsImagesAutomatically")

~/Ally/LG Droid Ally System Dump/app# strings *odex | egrep -i vzw
(human-filtered ... lots of other stuff)

X-VzW-MDN
!bluetooth_confirm_passkey_msg_vzw
vzw_service_number
-Lcom/lge/VerizonHiddenMenu/Vzw_hidden_main$1; (and about 50 more related lines)
VZW_MIP_SET
VZW_PROG_KEY
VzwFieldTestMain.java
Vzw_hidden_main.java (and another 10 or so relevant java file-names)
vzwServiceProg
#vzwServiceProg ====> vzwServiceProg
vzwService_Number
vzwSrvProgState
vzw_hidden_main_title
vzw_service_number
vzwgpsOne
vzwserviceprog


( for file in `ls -1 *odex` ; do echo =-=-= $file =-=-= ; strings $file | egrep -i stability ; done ) | less
( for file in `ls -1 *odex` ; do echo =-=-= $file =-=-= ; strings $file | egrep -i module ; done ) | less

... both came back blank


I also found references to the LG Eve service manual but as yet none for the Ally.
LG_GW620_SVC_ENG ... http://csmg.lgmobile.com:9002/swdata/WEBSW/GW620/RUSCO/1203/EN_2)GW620_SVC_ENG_091203.zip



I apologize that this is a raw and somewhat jumbled mess ... it is quite late, and I'm suddenly called to head home by my wife who just got back from a performance ... I'll be around this weekend and will look in here for suggestions on what to hunt for ...

I can start to look at things on a raw-view or hex-view of the odex files from the system-dump once I have potential targets, but I've never done this before so I'm likely to look right at something interesting and miss it.

Annoyingly, I cannot find where the Eve EVE&ADAM code is hidden in the Eve system tree odex files, leading me to believe that it is embedded somewhere other than where i'm looking (I could not find a valid link to the entire Eve Source Tree and I'm too tired / overdue to hunt now)

If we can find the Eve code-location, we can check the same place in the Ally trees.
 
Holy crap Marcus, lol your a genius, looks like you are the one that will root it because you pretty much have everything you need... wish I could help but I got no idea what you just posted, but if you can explain it a little bit, I'll help out as much as I can
 
Holy crap Marcus, lol your a genius, looks like you are the one that will root it because you pretty much have everything you need... wish I could help but I got no idea what you just posted, but if you can explain it a little bit, I'll help out as much as I can
LOL no doubt, i just scanned over that, an i think i have a tumor now:D Seriously though, if this thing does get rooted, there will be a ton of people happy, as it would be like curing a paralized man, and allowing him to walk.:D
 
i ran strings on the firmware upgrade dll. it seems to use zlib for compression. i found lots of occurrences of 0x78 0x9C (default zlib 2 byte header) in the wdb, but no idea whether they're zlib streams or part of the compressed data. i'll try stripping some chunks out and decompressing them later.
 
i ran strings on the firmware upgrade dll. it seems to use zlib for compression. i found lots of occurrences of 0x78 0x9C (default zlib 2 byte header) in the wdb, but no idea whether they're zlib streams or part of the compressed data. i'll try stripping some chunks out and decompressing them later.

Take a look asroot2 someone said it works? =/
 
hell yeah it does. i just got root and backed up my mtds. i have to go to work but i'll try and create a rooted boot.img later
You will be my hero if you can show me what to do I tried the steps to push the asroot to my device it says it pushed but cannot get root access. I was in linux doing this since windows would not find drivers no matter how i installed them. Personally I love my rooted droid which is overclocked and all. I want my ally rooted so I can uninstall apps that I don't like that came with the os like socialite.
 
You will be my hero if you can show me what to do I tried the steps to push the asroot to my device it says it pushed but cannot get root access. I was in linux doing this since windows would not find drivers no matter how i installed them. Personally I love my rooted droid which is overclocked and all. I want my ally rooted so I can uninstall apps that I don't like that came with the os like socialite.
I think just being able to do just that will really help this phone bigtime. Socialite and LG Launcher are like sludge in your oilpan in my book :D
 
Very cool, hopefully you guys will have this opened up before too long :).

Yeah I hope that steps get posted soon, I would do the root right now, i know how to root it now, I just dont know how to properly back up my current rom so gonna wait
 
original boot img: http://www.fileden.com/files/2010/3/21/2800273//mtd0_boot.img

EDIT. my bott with root doesn't seem to bott from flash don't flash it
this has adbd running as root, and gives root with su, no superuser apk yet though

Alright well PM me if you need testing or something or if you figure something out... Really want root, first android phone and I don't want it to be left in the dark. The CPU in this phone can be overclocked to 800mhz easily that would make things prettier
 
original boot img: http://www.fileden.com/files/2010/3/21/2800273//mtd0_boot.img

EDIT. my bott with root doesn't seem to bott from flash don't flash it
this has adbd running as root, and gives root with su, no superuser apk yet though

Alright well PM me if you need testing or something or if you figure something out... Really want root, first android phone and I don't want it to be left in the dark. The CPU in this phone can be overclocked to 800mhz easily that would make things prettier


Dang it didn't mean to double post moderator please delete this. Im sorry
 
my phone's bricked until we find the keypresses to get into fastboot. i was getting fastboot through adb before.
keycodes i've found so far:
Power + Menu + Send = Recovery (tried making an update zip to reflash, failed)

Power + Phone + Vol Up or Down shows a box with an arrow and the green droid, probably initial setup or some kind of data wipe, i wouldn't play with it without backups

still haven't found fastboot.
 
Status
Not open for further replies.
Back
Top Bottom