S
SapphireEx
Guest
Ooooh. Upload the strings?succesfully wrote new bands values to phone and it stay after reboot too
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Ooooh. Upload the strings?succesfully wrote new bands values to phone and it stay after reboot too
Can you write root for it too lol?succesfully wrote new bands values to phone and it stay after reboot too
you can use nv calculator at the play store, check the bands you want to add then write it to nv lte bc configOoooh. Upload the strings?
lolCan you write root for it too lol?
don't forget to backup your nv partition before trying any new values.Ooooh. Upload the strings?
Good to see you around and staying connected with us.... Thanks for the sharing...here is a video shows how to modify the lte decimal value
<br>
<a href='https://www.youtube.com/embed/GEO1UXuFLbI?wmode=opaque'>https://www.youtube.com/embed/GEO1UXuFLbI?wmode=opaque</a>
Easier method that can be used on all zte phones.you can use nv calculator at the play store, check the bands you want to add then write it to nv lte bc config
that code didn't work on my zmaxEasier method that can be used on all zte phones.
Dialer-> ##3424#
Then select mtp+diag in drop down list for port.
Then use dfstool, that app has a band tab, click lte, Once in that tab press read...
Then select all the bands you want to enable that are available and then click write.
Don't need to go into ftm mode, can be done with normal boot.
So apparently a new exploit has been discovered that affects all Android versions prior to 8.0
It involves the toast messages.
https://threatpost.com/android-user...al&utm_source=twitter.com&utm_campaign=buffer
It seems to be a better version of Cloak and Dagger. I have 0 experience with that exploit though. Maybe @messi2050 would know.I have no, but my data just shut off completely. Rip
Are we going to try this exploit?
Oooooh. Do we have a PoC anywhere?
&amp;amp;amp;amp;lt;br&amp;amp;amp;amp;gt; *Edit Whatever happened to the guy who had Cloak and Dagger running?
First paragraph:He got others to get it to supposedly work. And he freaked out about ZTE &amp; how this phone was a info leaker. Doubt he would be of any use. From reading the link. Doesn't this just target the App UI overlays so it works like a keylogger ? Don't see how this will get us past the bootloader or rooted.
Now, they said admin, and not specifically root, but that could just be the lack of knowledge on the journalist's part. In theory, this exploit should 'just' act as a door, and allow true malware to get installed that does the rooting job.Security researchers warned of a high-severity Android flaw on Thursday that stems from what they call a “toast attack” overlay vulnerability. Researchers say criminals could use the Android’s toast notification, a feature that provides simple feedback about an operation in a small pop up, in an attack scenario to obtain admin rights on targeted phones and take complete control of them.
Guess you already tried it on B08?Anyone on a rediculously low firmware like show models and B00-B04 (B03 on tmob I think) feel like testing quadrooter? I know we tested B14 and it came back negative, but earlier patches should be vulnerable to quadrooter.
It does not work. I would've rooted ages ago. I just tried it again 'cause why not. King root doesn't root it. I have never gotten temp root on this phone using kingroot and I have on other zte devices before disabling right protection. Etc
Please try QuadRooter for us Chloe936. Don't just try once, but 4-7 times (Come on lucky 7). Let us know how it goes.Woah I missed a lot, nice progress. Let me know if I can be of any help lol.
Where are those bin files you talked aboutMaybe just upload it to gdrive. We could use it maybe sometime
I remember that. He said something about a hidden user named "sodu" or something like that.He got others to get it to supposedly work. And he freaked out about ZTE & how this phone was a info leaker. Doubt he would be of any use. From reading the link. Doesn't this just target the App UI overlays so it works like a keylogger ? Don't see how this will get us past the bootloader or rooted.
Don't know how this can be possible but probably that coderam.bin contains our signature keys or is itself is our programmer _-_ this exactly the same zte signing method used on axon and their other devices programmer...Yeah let me get you the gdrive link.
Here you go @messi2050
https://drive.google.com/open?id=0BzB13eJzumiNYzhyWWJGS0NzbmM
Malformed command&#0;&#0;&#0;invalid header&#0;&#0;resource does not exist&#0;unknown client via rpm-npa adapter&#0;&#0;&#16;&#65533;&#9;&#0; &#65533;&#7;&#0;&#16;&#65533;&#9;&#0;&#16;&#65533;&#9;&#0;&#16;&#65533;&#9;&#0;&#16;&#65533;&#9;&#0;&#16;&#65533;&#9;&#0;&#16;&#65533;&#9;&#0;&#0;5&#12;&#0;&#16;&#65533;&#9;&#0;&#0;5&#12;&#0;&#0;5&#12;&#0;HAL_clk_GetNextClockInDomain returned 0 (ClockDomain Index: %d).&#0;&#0;&#0;&#0;Unable to turn ON clock: %s.&#0;&#0;&#0;&#0;%s (Enabled: 1)&#0;Q&#65533;&#0;&#0;B&#11;&#0;&#0;&#65533;(&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;Q&#65533;&#0;&#0;B&#11;&#0;&#0;&#27562;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;&#0;0&#6;&#0;&#0;(&#0;&#0;&#0;&#65533;&#1;&#0;&#0;&#65533;&#1;&#0;&#0;&#65533;&#1;&#0;&#0;&#2;&#0;&#0;&#0;E&#1;&#0;&#2;H&#2;&#0;&#0;&#65533;&#0;&#0;&#2;&#8;&#6;&#0;&#0;system&#0;pmic_arb_base_addr&#0;owner&#0;interrupt&#0;smd_intr_enabled&#0;ClockSources&#0;gcc_rpm_proc_fclk&#0;gcc_sys_noc_axi_clk&#0;gcc_sys_mm_noc_axi_clk&#0;gcc_pcnoc_ahb_clk&#0;gcc_bimc_clk&#0;gcc_apss_tcu_async_clk&#0;gcc_apss_axi_clk&#0;gcc_mss_q6_bimc_axi_clk&#0;gcc_qdss_at_clk&#0;gcc_qdss_traceclkin_clk&#0;gcc_qdss_stm_clk&#0;gcc_qdss_tsctr_div2_clk&#0;gcc_rbcpr_clk&#0;gcc_spmi_ahb_clk&#0;gcc_spmi_ser_clk&#0;gcc_ipa_clk&#0;ClockLogDefaults&#0;ClockVregRailMap&#0;ClockBIMCMMNOCMap&#0;DEFAULT_FREQUENCY&#0;QTIMER_AC_BASE&#0;QTIMER_BASE
Whosawhatsit? http://www.bijishequ.com/detail/486985?p= (block diagram for RPM-NPA)Malformed command&#0;&#0;&#0;invalid header&#0;&#0;resource does not exist&#0;unknown client via rpm-npa adapter
I think we are very near like this for the first timeNow, this bit is VERY interesting.