Shadowskater1031
Newbie
okay so i have flashed the img and it didnt stick its either the flash tool or the way the flash img was compiled had no effect on the device as it did not stick and ive done this before your phone should not brick
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
okay so i have flashed the img and it didnt stick its either the flash tool or the way the flash img was compiled had no effect on the device as it did not stick and ive done this before your phone should not brick
What, did you try to flash it with Odin? If so then that is your problem.yes i did thats the first thing i do when i get an android phone ive flashed imgs like this i had a samsung galaxy core and i flashed the twrp img of the galaxy core duo and it orked so this should work as long as the chipset is similar
There is also the chance the flash tool is for mediatek chips, zte has a ton of phone that use them and some of the flash tools I've found for there phone are for non Qualcomm CPUs, make sure to double check that the tool is for the right type of chips, also it could be because we can't get into a unlocked edl mode, if i remember correctly our device does not support unsigned imgs in its supported version of qpst, without a signed firehouse we are out of luck, unless you guys have a different mode to do this inWhat, did you try to flash it with Odin? If so then that is your problem.
Sp flash tool is for Mediatek chips. The zmax pro has a Qualcomm chipTo flash this twrp with sp flash tool I need a Android scatter emmec file to specify the directories can if Messi can give do it I will flash this file
I've spent the past few hours digging through several threads & hundreds of posts on XDA and it looks like the dirty cow vulnerability might be able to be exploited in order to push/pull a recovery image...it's too complex for me though
I've spent the past few hours digging through several threads & hundreds of posts on XDA and it looks like the dirty cow vulnerability might be able to be exploited in order to push/pull a recovery image...it's too complex for me though
I did see that. The instructions are very vague though. I was having problems because I don't have ndk installed on my box. I then ran out of hotspot data while trying to install ndk and got throttled down to 16kB/S which is basically useless.
You need to pull the stock recovery.img before you try to flash twrp. You don't want to end up with a broken recovery and no stock recovery backup.I will attempt to do the dirty cow payload on my PC I'm going to setup a VM then I will install FlashFire and flash the twrp IMG and see if it works
See if you can run this command.I've gotten the DirtyCow exploit running on my Zmax but there is MUCH more work to be done before it is rooted. I can execute any script as root. Give me something to run and I can run it.
Lol don't worry I wouldn't ask you to do anything risky without warning you of the danger. The command in my above post should make a backup of the stock recovery and copy it to your internal storage.Ran it, didn't say anything... What did you make me do to my phone?
Did it say permission denied?Both. Doesn't seem to work. DirtyCow claims that the phone can be exploited using it. I will try to look at my android NDK to make sure the modules are installed correctly.