Dont get our hopes up for the big let down!
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Dont get our hopes up for the big let down!
Dont expect a full blown root just yet, i have only had 2 days to play with this and still need to unpack bootloader to find where the actual permission is for main boot... Recovery position is at default.Holy shit!
And how exactly did you modify it to make the exploit work?dirty c0w modified does in fact exploit the system!
Now just need to find zte's suid configuration as it currently being set to a default uid to test exploit
Modified what memory and kernel bits it attacks.D
And how exactly did you modify it to make the exploit work?
Currently its able to set selinux to permissive on the kernel in the recovery allowing full root shell via recovery, but since stock recovery doesnt allow adb access its useless at the moment. But does show he exploit bypassed zte's boot protection without bootloop.So with what you have now, you have root access until you reboot the phone, or how exactly does it work?
https://androidforums.com/threads/recovery-twrp-v3-for-zte-zmax-pro.1086861/i think i may have found the issue, anyone have a link to messi's twrp for the zmax pro?
anyone else feelin that flashaholic itch getting stronger or just me?
<--me sense seeing the recent posts i need it man i need it!
I've used systemui tuner and it's cleaned my status bar but I'm too scared to try dpi changerI wouldn't try it
Godspeed. DD is terrifying to me, so you have quite the co-hones to do this.i think i may have found the issue, anyone have a link to messi's twrp for the zmax pro?
Oh yeah I understand that, it's just picking knowing that if one digit is out of place you overwrite whatever sector with garbage is terrifying to me personally haha, I had to do it for the 3DS tho. Fun stuff.DD isnt that terrifying, so long as you know exacltly what and where to do it. I think my first encounter with it was when I updated my old Palm Pre to webOS 2.0 (it was never officially released for the original Pre).
I just realized you ran dirtycow on windows. You beautiful bastard, did you run it via ADB shell?dirty c0w modified does in fact exploit the system!
Now just need to find zte's suid configuration as it currently being set to a default uid to test exploit
Oh yeah I understand that, it's just picking knowing that if one digit is out of place you overwrite whatever sector with garbage is terrifying to me personally haha, I had to do it for the 3DS tho. Fun stuff.
dont be silly you can only root this phone using linux lmaoI just realized you ran dirtycow on windows. You beautiful bastard, did you run it via ADB shell?