• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root ZTE ZMAX Pro (Z981) root discussion

Status
Not open for further replies.
Those are all files you can read without root. What you cannot do without root is move them, delete them, or change the permissions. Look to see if you have a recovery.img in the root of your internal storage ( /sdcard/recovery.img or /storage/emulated/0/recovery.img).
 
ugh, I installed NDK wrong then because this shell isn't root... hate my life lol, it's such a pain in the ass to install the NDK. Now to spend another 4 hours trying to install it. wew.
 
Noticed that too. I'm so close, I just need to get the NDK module working then the DirtyCow exploit should execute properly.
 
Noticed that too. I'm so close, I just need to get the NDK module working then the DirtyCow exploit should execute properly.
Did you look and see if you had a recovery.img in your internal storage? I only ask because if it didn't work, it should have said permission denied.

Also, another quick way to verify root is to run the command

cd /data && ls

If you get permission denied you don't have root. If it gives you a list of files and folders then you have root access.
 
I checked, I don't have it. I'm reinstalling Android SDK and NDK properly so the exploit will launch in root. Such a pain in the ass, but if it works then it will be well worth it. :)

*UPDATE*
Doing a proper install of the Android SDK right now... tomorrow will be the NDK and then FINALLLLLLLLYYYYY we can start screwing around with a shell in root. Please be advised though that it wont lead directly to root, as Android 4.1 and up doesn't like it when you modify init files while the device is on - meaning if you touch the wrong file your device will reboot and replace the modified file. But there are ways around this such as screwing with some of the WPA2 files. The general idea is that we need to find an application that is executed as root when the phone is on that we can modify. That's the hardest part. There is an XDA thread talking about it here http://forum.xda-developers.com/general/security/dirty-cow-t3484879/page5 perhaps we can take a note or two so we can get this done efficiently and learn from their methods and mistakes.
 
Last edited:
hey guys i found this form for the zte phone with firefox os but there is some interesting stuff you might want to check out...i really want root.....that's the website
https://sites.google.com/site/zteopenfirmware/home/cwm
lgJjfKqvN.png
 
Still can't get the exploit to launch properly... anyone got any idea how to properly install the Android SDK and NDK in Ubuntu? The guides don't help out much.
 
I've tried my luck at this earlier and I couldn't get a root shell myself either. Maybe I was making a mistake too, I don't know.

Yes but there is no way to launch the SDK to install the NDK module...

If you go into Android Studio's help menu when you have something like a sample project open and search for SDK Manager you can bring it up.
 
If you installed the SDK via apt-get then you should be able to launch the SDK manager from the command line.
Just open a terminal and run the command
`android sdk`
That's the thing - I can't. I'll boot my VM back up and try again just to be sure, but right after the android-sdk was installed, I couldn't launch it.
 
Just disables RO to RW. Try this:
- unlock oem
- enter terminal cmd
- upon reboot, run KR app
..see what happens
 
Status
Not open for further replies.
Back
Top Bottom