Lmao this is why i dont share exploits with people as this is why they get patched immediately.Gotta use recowvery dirty cow, not vanilla. It's slightly modified for use on dm-verity enviroments
Great job!
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Lmao this is why i dont share exploits with people as this is why they get patched immediately.Gotta use recowvery dirty cow, not vanilla. It's slightly modified for use on dm-verity enviroments
Lmao this is why i dont share exploits with people as this is why they get patched immediately.
Great job!
Lmao this is why i dont share exploits with people as this is why they get patched immediately.
Great job!
If you got a exploit, then you shouldn't share the technical aspects of it in this forum. Its ok to say "I found a way to exploit the system" but how you did it or what you used, should only be shared with trusted people through pm or email. If you actually root the phone and install twerp and custom rom,you still shouldn't share the methods here in the public till all bases are covered.Lmao this is why i dont share exploits with people as this is why they get patched immediately.
Great job!
The exploit was already made public due to it being used for another phone, and other forums have already taken to testing it. There was nothing secret about it. Also, the vanilla exploit alone isn't enough to actually do anything, and it needs to be modified to actually work, which I didn't share the details of.If you got a exploit, then you shouldn't share the technical aspects of it in this forum. Its ok to say "I found a way to exploit the system" but how you did it or what you used, should only be shared with trusted people through pm or email. If you actually root the phone and install twerp and custom rom,you still shouldn't share the methods here in the public till all bases are covered.
Ok I know that but the point I was trying to make is specific methods should not be posted in a open forum till everything is finished.The exploit was already made public due to it being used for another phone, and other forums have already taken to testing it. There was nothing secret about it. Also, the vanilla exploit alone isn't enough to actually do anything, and it needs to be modified to actually work, which I didn't share the details of.
Pingpong root for s3 is public, but it can be used for all zte with kitkat. Does zte know that?The exploit was already made public due to it being used for another phone, and other forums have already taken to testing it. There was nothing secret about it. Also, the vanilla exploit alone isn't enough to actually do anything, and it needs to be modified to actually work, which I didn't share the details of.
I don't understand, they can patch it, but not for your current version?Lmao this is why i dont share exploits with people as this is why they get patched immediately.
Great job!
No i havent and from testing on another phone with b20, it still is capable of being exploitedI don't understand, they can patch it, but not for your current version?
Did you update?
I'm never updating to B20.
Four months, fourteen days, with the original version closed. But no moderators are counting.How long has this thread been active for?
Somewhat, in our situation its not just capable of writing to recovery, but also the main boot partition.Further black belt on my google-fu. The creator of the 'that' said:
By the way if your bootloader is locked it won't do anything, it will write to recovery but just reboot into system how it was and system will flash stock recovery back again
And someone exactly has same output with locked bootloader device And that one actually has boot.img. installed. So we are back to the problem of that damn locked bootloader then?
yea It always took me to a black screen after rebootFurther black belt on my google-fu. The creator of the 'that' said:
By the way if your bootloader is locked it won't do anything, it will write to recovery but just reboot into system how it was and system will flash stock recovery back again
And someone exactly has same output with locked bootloader device And that one actually has boot.img. installed. So we are back to the problem of that damn locked bootloader then?
One silver lining to this phone is I found alternative ways to optimize my phone Without Root.How long has this thread been active for? I practically have given up root for this phone. I just pop adguard on and carry on. I'll check back in six months to see if this phone really gets root. lol.
Oh and don't expect 7.0 on the zmax pro. Zte has never updated an O S on any phone ..They just make another similar model with the new O S ..lol
'Stay Woke' - Donald Glover
Reminder you can help the cause by testing /data/* for chmod-able folders, thanks loves.
adb shellHow do I test for that I'm new and really trying to learn
adb shell
>the shell pops up
cd /data
ls (lists dirs)
go in each dir
chmod 777
successful?
Ah yeah, thank you, my syntax is outta wackJust a slight correction there. It would be
cd /data
chmod 777 dir
Where dir is the name of a directory located under /data.